General

  • Target

    96a04f7eb7908d7853adbbd9ce387293.exe

  • Size

    736KB

  • Sample

    230606-cp6cdabf75

  • MD5

    96a04f7eb7908d7853adbbd9ce387293

  • SHA1

    1ff505e738deaf12a92a8567ed4fcc9b4b268b6a

  • SHA256

    f01a0840d654fcbc17eb7aa7fa385cc8492141f312126971b4130a328157179b

  • SHA512

    ca0a4f75d33b899cc858e5d95d6e400bb26cfc1f8042865d62f6f7caeb4224f5f914da21f15b97afeee1d2f9538638ada18ad06810f254271966da3be0041938

  • SSDEEP

    12288:qMray90ZwcHXKOQJrN+praN6b4SkXezlnTLYy+WqsozVwGs:0yAHXKOW5+praUd+SxQBsMGV

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      96a04f7eb7908d7853adbbd9ce387293.exe

    • Size

      736KB

    • MD5

      96a04f7eb7908d7853adbbd9ce387293

    • SHA1

      1ff505e738deaf12a92a8567ed4fcc9b4b268b6a

    • SHA256

      f01a0840d654fcbc17eb7aa7fa385cc8492141f312126971b4130a328157179b

    • SHA512

      ca0a4f75d33b899cc858e5d95d6e400bb26cfc1f8042865d62f6f7caeb4224f5f914da21f15b97afeee1d2f9538638ada18ad06810f254271966da3be0041938

    • SSDEEP

      12288:qMray90ZwcHXKOQJrN+praN6b4SkXezlnTLYy+WqsozVwGs:0yAHXKOW5+praUd+SxQBsMGV

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.