General

  • Target

    de960a7f0f23bd1895a729830d06d13a20b547d6c6dea6b0e66f7bf702a70169

  • Size

    948KB

  • Sample

    230821-nlek2ace48

  • MD5

    aecb8dcd4d7447026916fa6ccb4106c9

  • SHA1

    8840d4d8bd35fa946084adc2891d505be3ed207b

  • SHA256

    de960a7f0f23bd1895a729830d06d13a20b547d6c6dea6b0e66f7bf702a70169

  • SHA512

    1d3d6d2f22c6a04e68f98773e6bfe6f9c8cfdf0a43397e325bfc7180d56c91dcefac365a8b2d6c26fdad2dbcd17ce904e9fdb60b2d69e31f7a34c5f744672f82

  • SSDEEP

    24576:hy8/Mk/eDWe8nsj2gjRbf9TKo4z41vWbvgBs:UlkSWVsj3RDMbQW

Malware Config

Extracted

Family

redline

Botnet

lang

C2

77.91.124.73:19071

Attributes
  • auth_value

    92c0fc2b7a8b3fc5a01baa1abf31c42a

Targets

    • Target

      de960a7f0f23bd1895a729830d06d13a20b547d6c6dea6b0e66f7bf702a70169

    • Size

      948KB

    • MD5

      aecb8dcd4d7447026916fa6ccb4106c9

    • SHA1

      8840d4d8bd35fa946084adc2891d505be3ed207b

    • SHA256

      de960a7f0f23bd1895a729830d06d13a20b547d6c6dea6b0e66f7bf702a70169

    • SHA512

      1d3d6d2f22c6a04e68f98773e6bfe6f9c8cfdf0a43397e325bfc7180d56c91dcefac365a8b2d6c26fdad2dbcd17ce904e9fdb60b2d69e31f7a34c5f744672f82

    • SSDEEP

      24576:hy8/Mk/eDWe8nsj2gjRbf9TKo4z41vWbvgBs:UlkSWVsj3RDMbQW

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks