General

  • Target

    fede49abf033598d10425ee69972c246b9ead4e562c8f435fcddd16874fa2b1b

  • Size

    661KB

  • Sample

    230912-mjzmrabg2v

  • MD5

    af9cb02d2a4517485e37d6ef2627dc06

  • SHA1

    64252eccdfcc2b28df39ba311169e4f79ffec3b5

  • SHA256

    fede49abf033598d10425ee69972c246b9ead4e562c8f435fcddd16874fa2b1b

  • SHA512

    84dfa940373b1981bd8e7136f65b2a199d6999cee91f10931ed9fb7026d41a1f47afaf3237873b8bda988925ad0eedcfb33ff2f2c9f298c5894d3aca4d080c96

  • SSDEEP

    12288:jMr8y90gyxWv6onCRGocqdozcoPAvk8Iol0KhXmNS:vymxWv6tGomzvPAM20cXmNS

Malware Config

Extracted

Family

redline

Botnet

virad

C2

77.91.124.82:19071

Attributes
  • auth_value

    434dd63619ca8bbf10125913fb40ca28

Targets

    • Target

      fede49abf033598d10425ee69972c246b9ead4e562c8f435fcddd16874fa2b1b

    • Size

      661KB

    • MD5

      af9cb02d2a4517485e37d6ef2627dc06

    • SHA1

      64252eccdfcc2b28df39ba311169e4f79ffec3b5

    • SHA256

      fede49abf033598d10425ee69972c246b9ead4e562c8f435fcddd16874fa2b1b

    • SHA512

      84dfa940373b1981bd8e7136f65b2a199d6999cee91f10931ed9fb7026d41a1f47afaf3237873b8bda988925ad0eedcfb33ff2f2c9f298c5894d3aca4d080c96

    • SSDEEP

      12288:jMr8y90gyxWv6onCRGocqdozcoPAvk8Iol0KhXmNS:vymxWv6tGomzvPAM20cXmNS

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks