General

  • Target

    3a369041440eec907acb1b854150c12c.bin

  • Size

    735KB

  • Sample

    230614-brpa7scg2w

  • MD5

    b4e92e3ee875505080c9ac82ad479a05

  • SHA1

    71e7cd2372a677bdfde721afcca4214f2266d9a0

  • SHA256

    3241bb44f7533ee8ca4deb3e58663efb08e4d6d2ebd71bfbcd3d897c52768fe2

  • SHA512

    4d4910fad0bcea81a2aea6eae49df84877400123e01fdbe1a1d4a73ceb43378e1873fee50ed8c3f7ca09e2011a3b985b2254807a60cb556a6e30ead9384477c7

  • SSDEEP

    12288:fY4ZV+GbUxFXWqIMNBtsVj27aZQ9O9fZvOwwfuLK8oPmQL0u3FWnKg8DSxBhuPN:fVGp3ftsp2ZAjmXPmQZ3FWnKFDSFul

Malware Config

Extracted

Family

redline

Botnet

boris

C2

83.97.73.129:19068

Attributes
  • auth_value

    205e4fccc0f8c7da1d56fb1da4ac5e6a

Targets

    • Target

      da11108b7fb14023a20b5d1316e9a5853690b80e079e77a1879ea9a446ef392a.exe

    • Size

      778KB

    • MD5

      3a369041440eec907acb1b854150c12c

    • SHA1

      f6d8aefb071b76daa9f0d2258c9d09a935dfd81e

    • SHA256

      da11108b7fb14023a20b5d1316e9a5853690b80e079e77a1879ea9a446ef392a

    • SHA512

      a928a70995532136e549986a0da3fa92d973ad0a784e6a76ed8da7571de4768cdc75ea7b0f3a5b4045eae93eb73a637a55bc38c34e563149c8a60200ed075105

    • SSDEEP

      12288:cMrvy90QTR7+xBhqWkRH4n9Q5Cac1ZER65LomG1wCa2RbHTuIbBcvQFH:zy7g3Q9YGC/Z1LoWCLnuItcvyH

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks