General

  • Target

    f898c0a897ed2c1bd5ab75d619bec853931bee37a8513e3ee295d2efed27942d

  • Size

    1.0MB

  • Sample

    230902-qqknysdc2t

  • MD5

    82d11f183aeef193b0f282afa04549ec

  • SHA1

    501c1ae2182753d318e78826b12cf626484dfb6f

  • SHA256

    f898c0a897ed2c1bd5ab75d619bec853931bee37a8513e3ee295d2efed27942d

  • SHA512

    13ae01b573ae52ac18b1e7c1b88377283a58ab587b5a00c212b56f4fa145a7d3abdd7a066d84e0244796a6e7d5946ae17927b008a6f4cf28ad3689a95a988aac

  • SSDEEP

    24576:dyW5PVTLTfBHnOROVe1QGOXs4LXjsjeeI0jNAcbK6it:4APVLfBu9qbLY6qNAoi

Malware Config

Extracted

Family

redline

Botnet

narik

C2

77.91.124.82:19071

Attributes
  • auth_value

    07924f5ef90576eb64faea857b8ba3e5

Targets

    • Target

      f898c0a897ed2c1bd5ab75d619bec853931bee37a8513e3ee295d2efed27942d

    • Size

      1.0MB

    • MD5

      82d11f183aeef193b0f282afa04549ec

    • SHA1

      501c1ae2182753d318e78826b12cf626484dfb6f

    • SHA256

      f898c0a897ed2c1bd5ab75d619bec853931bee37a8513e3ee295d2efed27942d

    • SHA512

      13ae01b573ae52ac18b1e7c1b88377283a58ab587b5a00c212b56f4fa145a7d3abdd7a066d84e0244796a6e7d5946ae17927b008a6f4cf28ad3689a95a988aac

    • SSDEEP

      24576:dyW5PVTLTfBHnOROVe1QGOXs4LXjsjeeI0jNAcbK6it:4APVLfBu9qbLY6qNAoi

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks