General

  • Target

    d27ff1549f0e13ef3d223934d50b89fe2b67b9bf5a1c8844e9c3dfb879843bc8

  • Size

    661KB

  • Sample

    230912-mne4xaed28

  • MD5

    ea205cd184205f6b522d09a571ff2b67

  • SHA1

    f4ed1c3523d77276c35582be3a1af8491529d11a

  • SHA256

    d27ff1549f0e13ef3d223934d50b89fe2b67b9bf5a1c8844e9c3dfb879843bc8

  • SHA512

    9697fc2e4ea72f4e210e7e6586dc4bbfe978b687b682b74a140cf23b4f85fad382c85a27c39a32bb4c11c570dc13a08f56979f82199a2ed76e1fde43e9adaf71

  • SSDEEP

    12288:yMrGy90yfz5qUDy1+EBCxdo2KR7H+afxQ24BmecVSYeyjXX7ll:gyT7rO10m2A7H7xQ24BuRe4L

Malware Config

Extracted

Family

redline

Botnet

virad

C2

77.91.124.82:19071

Attributes
  • auth_value

    434dd63619ca8bbf10125913fb40ca28

Targets

    • Target

      d27ff1549f0e13ef3d223934d50b89fe2b67b9bf5a1c8844e9c3dfb879843bc8

    • Size

      661KB

    • MD5

      ea205cd184205f6b522d09a571ff2b67

    • SHA1

      f4ed1c3523d77276c35582be3a1af8491529d11a

    • SHA256

      d27ff1549f0e13ef3d223934d50b89fe2b67b9bf5a1c8844e9c3dfb879843bc8

    • SHA512

      9697fc2e4ea72f4e210e7e6586dc4bbfe978b687b682b74a140cf23b4f85fad382c85a27c39a32bb4c11c570dc13a08f56979f82199a2ed76e1fde43e9adaf71

    • SSDEEP

      12288:yMrGy90yfz5qUDy1+EBCxdo2KR7H+afxQ24BmecVSYeyjXX7ll:gyT7rO10m2A7H7xQ24BuRe4L

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks