General

  • Target

    faa55e75240ffa085cad56dd1f39c5e575eee18fa68bfb0c3a73c2b90fc99537

  • Size

    948KB

  • Sample

    230820-rxprxsfg75

  • MD5

    5933b167debcb026a38ca396515033b5

  • SHA1

    298a7405ed31a4e2652cdbde3602b5c5f820727c

  • SHA256

    faa55e75240ffa085cad56dd1f39c5e575eee18fa68bfb0c3a73c2b90fc99537

  • SHA512

    a2574194af043c9e457267e257c932291dbdaafc5d251cfebee0e56bf63cc9661ebe7cf833a108a44853769d55c0b977441afcc953cdd6500f71b9e33fc5b162

  • SSDEEP

    12288:dMrmy90IE+K03ROHbC57/QStoGjBR92oBoditk9/suud0waLIaOZ5txDg:nytDsTCj7sLdH54wURZ5fDg

Malware Config

Extracted

Family

redline

Botnet

chang

C2

77.91.124.73:19071

Attributes
  • auth_value

    92b880db64e691d6bb290d1536ce7688

Targets

    • Target

      faa55e75240ffa085cad56dd1f39c5e575eee18fa68bfb0c3a73c2b90fc99537

    • Size

      948KB

    • MD5

      5933b167debcb026a38ca396515033b5

    • SHA1

      298a7405ed31a4e2652cdbde3602b5c5f820727c

    • SHA256

      faa55e75240ffa085cad56dd1f39c5e575eee18fa68bfb0c3a73c2b90fc99537

    • SHA512

      a2574194af043c9e457267e257c932291dbdaafc5d251cfebee0e56bf63cc9661ebe7cf833a108a44853769d55c0b977441afcc953cdd6500f71b9e33fc5b162

    • SSDEEP

      12288:dMrmy90IE+K03ROHbC57/QStoGjBR92oBoditk9/suud0waLIaOZ5txDg:nytDsTCj7sLdH54wURZ5fDg

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks