General

  • Target

    34bb4971bcb414c390ec5baba32b337a91f51f5c1378852a2e089833147e069e

  • Size

    857KB

  • Sample

    230606-wdfgcseh24

  • MD5

    971a95243566a84b007d64c689a9625c

  • SHA1

    0d93c62e8cf5f52c8798b2e94bc84108c5860d90

  • SHA256

    34bb4971bcb414c390ec5baba32b337a91f51f5c1378852a2e089833147e069e

  • SHA512

    b293db2301b8cb76f80e1b6f59f5dc41e5e797952d9ec9dde2c45a6a8f3d3eae482b594a808904ed71571a73ddbc5f8fa14aa71b42575683d28f6fc71f74ed2c

  • SSDEEP

    24576:yy5mENYulKgGoUdx0TSXJzPcs9cLEHA22:Z5xfl1uZXJYsIl

Malware Config

Extracted

Family

redline

Botnet

lupa

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a764aa41830c77712442516d143bc9c

Targets

    • Target

      34bb4971bcb414c390ec5baba32b337a91f51f5c1378852a2e089833147e069e

    • Size

      857KB

    • MD5

      971a95243566a84b007d64c689a9625c

    • SHA1

      0d93c62e8cf5f52c8798b2e94bc84108c5860d90

    • SHA256

      34bb4971bcb414c390ec5baba32b337a91f51f5c1378852a2e089833147e069e

    • SHA512

      b293db2301b8cb76f80e1b6f59f5dc41e5e797952d9ec9dde2c45a6a8f3d3eae482b594a808904ed71571a73ddbc5f8fa14aa71b42575683d28f6fc71f74ed2c

    • SSDEEP

      24576:yy5mENYulKgGoUdx0TSXJzPcs9cLEHA22:Z5xfl1uZXJYsIl

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks