General

  • Target

    c8bedbff4bcfd3b957fe59850effbff156241785b86e41f621798a90dbaeaaf9

  • Size

    1012KB

  • Sample

    230820-mkhqmagc2x

  • MD5

    ddd682d5a3cef873b9cf95ec21b13e85

  • SHA1

    85a50e0f8d951bf09200cad7f0412c98b5898749

  • SHA256

    c8bedbff4bcfd3b957fe59850effbff156241785b86e41f621798a90dbaeaaf9

  • SHA512

    d14cb17eb9ffe06ccefa0f9e24dfe9b2b9a27e4d27fa2f6014bc98351de566631176398f32a8f6be7caad52fef351b2b136c7808277837ad2bcdb0677eb14051

  • SSDEEP

    12288:1MrUy90tP38ikjoOYfyNdq2NPStzDLmVKvSUO7wOzQvZbTn05YVUi+okJI+CXiyM:pywcvYsdqEPuzDK8M7DzQlROe+CQeE

Malware Config

Extracted

Family

redline

Botnet

chang

C2

77.91.124.73:19071

Attributes
  • auth_value

    92b880db64e691d6bb290d1536ce7688

Targets

    • Target

      c8bedbff4bcfd3b957fe59850effbff156241785b86e41f621798a90dbaeaaf9

    • Size

      1012KB

    • MD5

      ddd682d5a3cef873b9cf95ec21b13e85

    • SHA1

      85a50e0f8d951bf09200cad7f0412c98b5898749

    • SHA256

      c8bedbff4bcfd3b957fe59850effbff156241785b86e41f621798a90dbaeaaf9

    • SHA512

      d14cb17eb9ffe06ccefa0f9e24dfe9b2b9a27e4d27fa2f6014bc98351de566631176398f32a8f6be7caad52fef351b2b136c7808277837ad2bcdb0677eb14051

    • SSDEEP

      12288:1MrUy90tP38ikjoOYfyNdq2NPStzDLmVKvSUO7wOzQvZbTn05YVUi+okJI+CXiyM:pywcvYsdqEPuzDK8M7DzQlROe+CQeE

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks