General

  • Target

    113173709abf09ea887c0a44641de6a8508f7961c03ea9a622635d4c02bd5995

  • Size

    947KB

  • Sample

    230821-eecnescd5z

  • MD5

    a7bebb5fddbe596462243023caf85f64

  • SHA1

    003b92ed30af5af93c8a24228f6ed0e0a3d6f1a2

  • SHA256

    113173709abf09ea887c0a44641de6a8508f7961c03ea9a622635d4c02bd5995

  • SHA512

    653c97b425e4dd73cb058f87d28e7875b5c2a5f127d003195695cc223a8cc4cca9abd2656e9cd7ea36cc57823b8f9dcf72a395ee0113e984e6c47efc87408705

  • SSDEEP

    24576:xyrRlutIuxYeLmQSmHjv5j5/uqD1a/Qx1wbFy:kVluLaGHTxRuqDZ/w

Malware Config

Extracted

Family

redline

Botnet

chang

C2

77.91.124.73:19071

Attributes
  • auth_value

    92b880db64e691d6bb290d1536ce7688

Targets

    • Target

      113173709abf09ea887c0a44641de6a8508f7961c03ea9a622635d4c02bd5995

    • Size

      947KB

    • MD5

      a7bebb5fddbe596462243023caf85f64

    • SHA1

      003b92ed30af5af93c8a24228f6ed0e0a3d6f1a2

    • SHA256

      113173709abf09ea887c0a44641de6a8508f7961c03ea9a622635d4c02bd5995

    • SHA512

      653c97b425e4dd73cb058f87d28e7875b5c2a5f127d003195695cc223a8cc4cca9abd2656e9cd7ea36cc57823b8f9dcf72a395ee0113e984e6c47efc87408705

    • SSDEEP

      24576:xyrRlutIuxYeLmQSmHjv5j5/uqD1a/Qx1wbFy:kVluLaGHTxRuqDZ/w

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks