General

  • Target

    b8a552548110bda4128f4898a2d91880.bin

  • Size

    536KB

  • Sample

    230606-b5na3abe67

  • MD5

    1d74838747614c61ed3a0e9f3d4bc95b

  • SHA1

    fd48059243d52db96c1b8c816daf171e30497d06

  • SHA256

    1d72bfcd85237fd9b137e883baaba14f0bb47e6db4acdfa43d1f9ef40968119e

  • SHA512

    c79c20df1a2017e9f9583521e4c06ee1d4ce8bd05dc344fb764c04c97707e2369ecfedb78a51fdd4cd40e20729adb8ddda885e1c18654af20d80f239150527c0

  • SSDEEP

    12288:iVgb1/XFeYjZGn80jkI5W26UXRP8m+Rf8xFguj7Lz4TeoU:5UWG8akIE26UBP8m+ejQ6

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      c5c0d8259b0179d3893845ee37f6cf226e7b5f5e0f86d89c25f67f25c5111f5d.exe

    • Size

      580KB

    • MD5

      b8a552548110bda4128f4898a2d91880

    • SHA1

      f3157dcedfc0225ee4fd27d89aceb38f5755c17e

    • SHA256

      c5c0d8259b0179d3893845ee37f6cf226e7b5f5e0f86d89c25f67f25c5111f5d

    • SHA512

      cb0d140a0c916364106055cb4a7b8f458d14373d08c510abd6dab889aa821cde139486ae6663c994c016b212fb8bf80cb8318615bb69a4e44e80bc374cebfed2

    • SSDEEP

      12288:fMr3y90FMHuYwinCm9AWt7GJLNE789d1CvM:4yHfjCmGU7YLNTCM

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks