General

  • Target

    b19f635702435d9bdbb88618a49aebb3da45ac3def9b9b79d009a5a8eb0a6f33

  • Size

    947KB

  • Sample

    230820-p1hfxaff28

  • MD5

    49ca76002e6fb2dd74c0506f7e06856b

  • SHA1

    339101ddc73fa4fc59e092cf40039f079b909915

  • SHA256

    b19f635702435d9bdbb88618a49aebb3da45ac3def9b9b79d009a5a8eb0a6f33

  • SHA512

    4e1db37169a9bf165b01ee3395a7b67b2432f8bf57b12bd6a663950397c6a8d7cf6e5936cd865734797509618617a76ed579be36a79503a4537ddf19168888fd

  • SSDEEP

    24576:2yaUo5vPMWAtCSdr9IFxzDzYK17kGxvAs1Lw:FaU8PMWAtHGbXzYG7kGZL

Malware Config

Extracted

Family

redline

Botnet

chang

C2

77.91.124.73:19071

Attributes
  • auth_value

    92b880db64e691d6bb290d1536ce7688

Targets

    • Target

      b19f635702435d9bdbb88618a49aebb3da45ac3def9b9b79d009a5a8eb0a6f33

    • Size

      947KB

    • MD5

      49ca76002e6fb2dd74c0506f7e06856b

    • SHA1

      339101ddc73fa4fc59e092cf40039f079b909915

    • SHA256

      b19f635702435d9bdbb88618a49aebb3da45ac3def9b9b79d009a5a8eb0a6f33

    • SHA512

      4e1db37169a9bf165b01ee3395a7b67b2432f8bf57b12bd6a663950397c6a8d7cf6e5936cd865734797509618617a76ed579be36a79503a4537ddf19168888fd

    • SSDEEP

      24576:2yaUo5vPMWAtCSdr9IFxzDzYK17kGxvAs1Lw:FaU8PMWAtHGbXzYG7kGZL

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks