General

  • Target

    138721f43ef2a475c47f84155f04d051ae21720cd23ee9aee0cf0024d364a155

  • Size

    858KB

  • Sample

    230606-m6g18adc65

  • MD5

    db43e51fea9952be399d2806206433a2

  • SHA1

    8d488f064fe283b0e22ff1292aab0b74a4244fbd

  • SHA256

    138721f43ef2a475c47f84155f04d051ae21720cd23ee9aee0cf0024d364a155

  • SHA512

    207b06ce3abb8fb7bc34a7b9c244e1bc9a3405de06607269975bfd4fd14c94c26000908307b9853ffc97eb2f3e671af215dfac715b449ba0ee7e899f08aecf23

  • SSDEEP

    24576:2yxdBn2tsxcRUMdyOs2f8/GpmIP3ntiljLwo6:Fxd4tjRUAs2fHLgLR

Malware Config

Extracted

Family

redline

Botnet

lupa

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a764aa41830c77712442516d143bc9c

Targets

    • Target

      138721f43ef2a475c47f84155f04d051ae21720cd23ee9aee0cf0024d364a155

    • Size

      858KB

    • MD5

      db43e51fea9952be399d2806206433a2

    • SHA1

      8d488f064fe283b0e22ff1292aab0b74a4244fbd

    • SHA256

      138721f43ef2a475c47f84155f04d051ae21720cd23ee9aee0cf0024d364a155

    • SHA512

      207b06ce3abb8fb7bc34a7b9c244e1bc9a3405de06607269975bfd4fd14c94c26000908307b9853ffc97eb2f3e671af215dfac715b449ba0ee7e899f08aecf23

    • SSDEEP

      24576:2yxdBn2tsxcRUMdyOs2f8/GpmIP3ntiljLwo6:Fxd4tjRUAs2fHLgLR

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks