General

  • Target

    c87b5c08bb153444b559f23f43d2d7bcdb0bf8335db32da097d1e6d675658a07

  • Size

    1.0MB

  • Sample

    230522-hb77pshc7y

  • MD5

    716f54bda98170d76f665c24155306da

  • SHA1

    a46b6e21a5c7b468dc43e17e4ecd35373d6de4ee

  • SHA256

    c87b5c08bb153444b559f23f43d2d7bcdb0bf8335db32da097d1e6d675658a07

  • SHA512

    1f61929455f97db9feee001884690aaec25d3c338c2bbb4430dff60b5c663676140a8a42a6a1050053d18042f7b53e7583d1352f9e0fce3f1d7e939f446c165c

  • SSDEEP

    24576:AyZvOQlr2xq9rhqsL1khpN40fmHfdsTJL9U:HoQlOq9r1kTNvfkfeT99

Malware Config

Extracted

Family

redline

Botnet

diza

C2

185.161.248.37:4138

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      c87b5c08bb153444b559f23f43d2d7bcdb0bf8335db32da097d1e6d675658a07

    • Size

      1.0MB

    • MD5

      716f54bda98170d76f665c24155306da

    • SHA1

      a46b6e21a5c7b468dc43e17e4ecd35373d6de4ee

    • SHA256

      c87b5c08bb153444b559f23f43d2d7bcdb0bf8335db32da097d1e6d675658a07

    • SHA512

      1f61929455f97db9feee001884690aaec25d3c338c2bbb4430dff60b5c663676140a8a42a6a1050053d18042f7b53e7583d1352f9e0fce3f1d7e939f446c165c

    • SSDEEP

      24576:AyZvOQlr2xq9rhqsL1khpN40fmHfdsTJL9U:HoQlOq9r1kTNvfkfeT99

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks