General

  • Target

    08e8013d59b7a088c895eb01bc33161652ca4af4727ac81749175391bce98bcf

  • Size

    1.0MB

  • Sample

    230521-flx4daah6z

  • MD5

    218e01b8394ec1c7811db1ad4632639d

  • SHA1

    dc1b5e2efad19dcbe96174a66079b0e0d65cad07

  • SHA256

    08e8013d59b7a088c895eb01bc33161652ca4af4727ac81749175391bce98bcf

  • SHA512

    9b46b40788be52aa88a05770868ba9a3715229f4eeff757e8181e89ae8ceb515593c9fb631e308c37643b3cbf4a7643fc852ea3f4e5e5d5eef56c08863727abb

  • SSDEEP

    24576:+yAHYc0flqxDY9OzeuZptw95TQ1s423jO/H:NAHDyqxDYgvw95cK42i/

Malware Config

Extracted

Family

redline

Botnet

diza

C2

185.161.248.37:4138

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      08e8013d59b7a088c895eb01bc33161652ca4af4727ac81749175391bce98bcf

    • Size

      1.0MB

    • MD5

      218e01b8394ec1c7811db1ad4632639d

    • SHA1

      dc1b5e2efad19dcbe96174a66079b0e0d65cad07

    • SHA256

      08e8013d59b7a088c895eb01bc33161652ca4af4727ac81749175391bce98bcf

    • SHA512

      9b46b40788be52aa88a05770868ba9a3715229f4eeff757e8181e89ae8ceb515593c9fb631e308c37643b3cbf4a7643fc852ea3f4e5e5d5eef56c08863727abb

    • SSDEEP

      24576:+yAHYc0flqxDY9OzeuZptw95TQ1s423jO/H:NAHDyqxDYgvw95cK42i/

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks