General

  • Target

    48bf9f1f8a5848c7439075e133a8525d6faa9a9c8bfae8768ba4ae6a20b80456

  • Size

    1.0MB

  • Sample

    230522-fjav3aeb36

  • MD5

    501706ec55ad396b2641f50e39473147

  • SHA1

    fdac01a6bd4efe6289d2b43e3e125b01e2504bb4

  • SHA256

    48bf9f1f8a5848c7439075e133a8525d6faa9a9c8bfae8768ba4ae6a20b80456

  • SHA512

    054b39bc293f6acd188f0315fb20f8de8583ec929e397b8946f2bddbe0c39fa636714eb22caa5963f1f026b851ed1afeeef74dcef97600beaa62f48981c8790c

  • SSDEEP

    24576:VyVW/5YHYq7p5DDhwgSR1oR2soiktJVXXXFiiqRT27btN6:w40YqPlSa0JvJHQRTsbt

Malware Config

Extracted

Family

redline

Botnet

diza

C2

185.161.248.37:4138

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      48bf9f1f8a5848c7439075e133a8525d6faa9a9c8bfae8768ba4ae6a20b80456

    • Size

      1.0MB

    • MD5

      501706ec55ad396b2641f50e39473147

    • SHA1

      fdac01a6bd4efe6289d2b43e3e125b01e2504bb4

    • SHA256

      48bf9f1f8a5848c7439075e133a8525d6faa9a9c8bfae8768ba4ae6a20b80456

    • SHA512

      054b39bc293f6acd188f0315fb20f8de8583ec929e397b8946f2bddbe0c39fa636714eb22caa5963f1f026b851ed1afeeef74dcef97600beaa62f48981c8790c

    • SSDEEP

      24576:VyVW/5YHYq7p5DDhwgSR1oR2soiktJVXXXFiiqRT27btN6:w40YqPlSa0JvJHQRTsbt

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks