General

  • Target

    4fecb1d7deb6932dfa5317593b17f8a5.bin

  • Size

    536KB

  • Sample

    230606-bk9zbsbd82

  • MD5

    e39d9eda70c9b9c49e99f51eb8bed407

  • SHA1

    68e3656ad01c069f65c86ba86a3445a759672e7e

  • SHA256

    4315ca94bfd2b881e680658b4edd42897ba54a7dd00d2e432c514c4c0f148b8e

  • SHA512

    0b47ddd6bea75fa7232e157666c2270f527412eced73096a375397d575a921eac9dc039822fa732251ad24cd72dfc3f64eee1c039c37db166389b7a91e25aa82

  • SSDEEP

    12288:MklJtLbN28lK7CZGqGI/cQKWIsXmIQXEU21HPoDOfa+alDEkTVSo:MklJtM43nml0U2WDOqEUVB

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      22551fff44698c2f7a48d2f4b8a7bcb58dd44a70e0b01db48d850bb1efcbbd56.exe

    • Size

      580KB

    • MD5

      4fecb1d7deb6932dfa5317593b17f8a5

    • SHA1

      2005ff6e0b79af16512c6db32e65d2c1ae021c9d

    • SHA256

      22551fff44698c2f7a48d2f4b8a7bcb58dd44a70e0b01db48d850bb1efcbbd56

    • SHA512

      c502a4ff304911120b5033a7aac99d36a1d5acd5950c5ac37a70f7d236d00a8d60796e9d38602e0fc0887f8a99db606569ac363f99ba730557b94542d47fb566

    • SSDEEP

      12288:RMrZy90+D8295Pkghk6ehZJDPhW82zqzNdiBjt5351qk:8yzdk93zr2zqHejt53v3

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks