General

  • Target

    0ca25bb52820dea06881b090fa8557fa64e3cf9fe2f7d49d568e0c799d116bfe

  • Size

    734KB

  • Sample

    230605-vjrwxahg38

  • MD5

    cc16e6beb4a706800d8f2f3600e3f8c6

  • SHA1

    7003415c0dc969efe94bc85d7063972b81c03bb4

  • SHA256

    0ca25bb52820dea06881b090fa8557fa64e3cf9fe2f7d49d568e0c799d116bfe

  • SHA512

    8227b78124580efc14391fae81c15e9da488fe5d1b9d9ece4885bc8a2f0da23bad3bbdaea210c018bbca7d77759b64124965bc4f64da60cd5dd1e75f3540ea47

  • SSDEEP

    12288:4MrOy90ibYSzMpnBIGFh789xqjLJhfsJvgMnG+93i+/Tdc1l8b+:WyvbYWMpnpYIlsJ9G+93ixV

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19048

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      0ca25bb52820dea06881b090fa8557fa64e3cf9fe2f7d49d568e0c799d116bfe

    • Size

      734KB

    • MD5

      cc16e6beb4a706800d8f2f3600e3f8c6

    • SHA1

      7003415c0dc969efe94bc85d7063972b81c03bb4

    • SHA256

      0ca25bb52820dea06881b090fa8557fa64e3cf9fe2f7d49d568e0c799d116bfe

    • SHA512

      8227b78124580efc14391fae81c15e9da488fe5d1b9d9ece4885bc8a2f0da23bad3bbdaea210c018bbca7d77759b64124965bc4f64da60cd5dd1e75f3540ea47

    • SSDEEP

      12288:4MrOy90ibYSzMpnBIGFh789xqjLJhfsJvgMnG+93i+/Tdc1l8b+:WyvbYWMpnpYIlsJ9G+93ixV

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks