General

  • Target

    b327e64ed701c24e576e9ded7d5e8b3f738b78a987572103154ac234dede72b8

  • Size

    1021KB

  • Sample

    230522-jem7daeg86

  • MD5

    85aec37a90561000df03d1f2bac62259

  • SHA1

    10f03cb764f1eb1a622f23a036b60f474fec8dc1

  • SHA256

    b327e64ed701c24e576e9ded7d5e8b3f738b78a987572103154ac234dede72b8

  • SHA512

    97e26c1097a96a0bd352e77017321a44705435057cd81e6d075aeba5f05f2495018ff8b301f7aeafb56a285f1ec6cc45d5ddcb570ee8cd30285e6d37bfb22fd2

  • SSDEEP

    24576:Qy3kyW6C3yKHOcUq1blBQSsqrE8n/RiOcLggg4s+pr88:X3kjR9HOcUq1BPEQ/RiOugg7

Malware Config

Extracted

Family

redline

Botnet

diza

C2

185.161.248.37:4138

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      b327e64ed701c24e576e9ded7d5e8b3f738b78a987572103154ac234dede72b8

    • Size

      1021KB

    • MD5

      85aec37a90561000df03d1f2bac62259

    • SHA1

      10f03cb764f1eb1a622f23a036b60f474fec8dc1

    • SHA256

      b327e64ed701c24e576e9ded7d5e8b3f738b78a987572103154ac234dede72b8

    • SHA512

      97e26c1097a96a0bd352e77017321a44705435057cd81e6d075aeba5f05f2495018ff8b301f7aeafb56a285f1ec6cc45d5ddcb570ee8cd30285e6d37bfb22fd2

    • SSDEEP

      24576:Qy3kyW6C3yKHOcUq1blBQSsqrE8n/RiOcLggg4s+pr88:X3kjR9HOcUq1BPEQ/RiOugg7

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks