General

  • Target

    ba0f32de76d892cc21190307bd97fd78deef96e21120be7ba54a2dcd849104e9

  • Size

    853KB

  • Sample

    230605-gjv2nsfe8z

  • MD5

    cb4e0d4e0e776d800c5966028f7d6294

  • SHA1

    a50e85eec3199751e55521d609408155e20c0a15

  • SHA256

    ba0f32de76d892cc21190307bd97fd78deef96e21120be7ba54a2dcd849104e9

  • SHA512

    3b7287f2f72f3f818ba106e634a8b9ff1d53275c3e9805d8e852d1f60ad23c58db5776cb6a4b32d5c7c21d1e0bcd3442f10027971f33e3f3d72c84f7c85219e8

  • SSDEEP

    12288:qMrdy90LvrLCfjsj0H/7wXlrSJhdnZIUsVa1jDl7OKCZYHyJ/MW1B5+ZF:ryovr2fjsj0H/7wpSBnlea1jjMBCF

Malware Config

Extracted

Family

redline

Botnet

lupa

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a764aa41830c77712442516d143bc9c

Targets

    • Target

      ba0f32de76d892cc21190307bd97fd78deef96e21120be7ba54a2dcd849104e9

    • Size

      853KB

    • MD5

      cb4e0d4e0e776d800c5966028f7d6294

    • SHA1

      a50e85eec3199751e55521d609408155e20c0a15

    • SHA256

      ba0f32de76d892cc21190307bd97fd78deef96e21120be7ba54a2dcd849104e9

    • SHA512

      3b7287f2f72f3f818ba106e634a8b9ff1d53275c3e9805d8e852d1f60ad23c58db5776cb6a4b32d5c7c21d1e0bcd3442f10027971f33e3f3d72c84f7c85219e8

    • SSDEEP

      12288:qMrdy90LvrLCfjsj0H/7wXlrSJhdnZIUsVa1jDl7OKCZYHyJ/MW1B5+ZF:ryovr2fjsj0H/7wpSBnlea1jjMBCF

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks