General

  • Target

    d6c28299320f455c1a761c22f3c38acc86e26278e0861e22dd22fe7b5175474e

  • Size

    662KB

  • Sample

    230912-l4lqyseb79

  • MD5

    f841126dec49816f164d0e33aff1ec55

  • SHA1

    52192f9dff8984b5e58a55016850593b30686d24

  • SHA256

    d6c28299320f455c1a761c22f3c38acc86e26278e0861e22dd22fe7b5175474e

  • SHA512

    e2017c8cb4f0cf52830bb155d96365d78020112b80af5a4a4b18ed2513a3b16fbde2f7aa275b524a06d67a740076bf532bd41a985798fdfb5d2adfed1dcb2d46

  • SSDEEP

    12288:yMrPy908SBNRaoANTzmOs++Fxlol49r0SsGnv9BNMT8M:RywBNRaBFWxPINGnFTM

Malware Config

Extracted

Family

redline

Botnet

virad

C2

77.91.124.82:19071

Attributes
  • auth_value

    434dd63619ca8bbf10125913fb40ca28

Targets

    • Target

      d6c28299320f455c1a761c22f3c38acc86e26278e0861e22dd22fe7b5175474e

    • Size

      662KB

    • MD5

      f841126dec49816f164d0e33aff1ec55

    • SHA1

      52192f9dff8984b5e58a55016850593b30686d24

    • SHA256

      d6c28299320f455c1a761c22f3c38acc86e26278e0861e22dd22fe7b5175474e

    • SHA512

      e2017c8cb4f0cf52830bb155d96365d78020112b80af5a4a4b18ed2513a3b16fbde2f7aa275b524a06d67a740076bf532bd41a985798fdfb5d2adfed1dcb2d46

    • SSDEEP

      12288:yMrPy908SBNRaoANTzmOs++Fxlol49r0SsGnv9BNMT8M:RywBNRaBFWxPINGnFTM

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks