General

  • Target

    283c8e29b803aced49c54903085b78bdeeb3a65507a04321c9a4543d0f074e84

  • Size

    479KB

  • Sample

    230507-zdh42ahe7w

  • MD5

    8f46286f4e42bfe915a77b037d031b5c

  • SHA1

    607a43c42fc68cf8a4ae43ca249e4ea5b1ef92c0

  • SHA256

    283c8e29b803aced49c54903085b78bdeeb3a65507a04321c9a4543d0f074e84

  • SHA512

    788c39dcea4fd84ea86ca00a7328d6e9fe131c82b594cb859d388a592204562efbf9fcd4c74997eee014c40c2176231629d904da73f4ac48882a67396bc8e98d

  • SSDEEP

    12288:QMryy90cV22tLSbkrsyQD+Vxifh9GYhW+q:yy7+b1Dh9PhW+q

Malware Config

Extracted

Family

redline

Botnet

dion

C2

217.196.96.101:4132

Attributes
  • auth_value

    6e0b6a3255923968b15f61a2c040c5c9

Targets

    • Target

      283c8e29b803aced49c54903085b78bdeeb3a65507a04321c9a4543d0f074e84

    • Size

      479KB

    • MD5

      8f46286f4e42bfe915a77b037d031b5c

    • SHA1

      607a43c42fc68cf8a4ae43ca249e4ea5b1ef92c0

    • SHA256

      283c8e29b803aced49c54903085b78bdeeb3a65507a04321c9a4543d0f074e84

    • SHA512

      788c39dcea4fd84ea86ca00a7328d6e9fe131c82b594cb859d388a592204562efbf9fcd4c74997eee014c40c2176231629d904da73f4ac48882a67396bc8e98d

    • SSDEEP

      12288:QMryy90cV22tLSbkrsyQD+Vxifh9GYhW+q:yy7+b1Dh9PhW+q

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks