General

  • Target

    f78dcd9565982099152691358ef070597428bb9f27c8c5ec798b1f52e479f964

  • Size

    1.0MB

  • Sample

    230524-fg2k1abe2t

  • MD5

    b1e1f53e7c2d8801070f9374498b4a6b

  • SHA1

    edb8b1cd6bf43170ecbae3c73d3bef0cd74e7728

  • SHA256

    f78dcd9565982099152691358ef070597428bb9f27c8c5ec798b1f52e479f964

  • SHA512

    faf1ea7eef93c806f499a6dbe644032f71c334e09bbbdc8eb81a5c6e2778f57633a97a57913fc3798d682680a7cdaacc042a7f1a2ed00faf40c31b273f175453

  • SSDEEP

    24576:GyeSzmwOLMk9cm03qafgsotrYlNQE55HdZ+D66Moe3GLroMl:Ve+BQBu3qU4yQEnX+2ro9Lrx

Malware Config

Extracted

Family

redline

Botnet

diza

C2

185.161.248.37:4138

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      f78dcd9565982099152691358ef070597428bb9f27c8c5ec798b1f52e479f964

    • Size

      1.0MB

    • MD5

      b1e1f53e7c2d8801070f9374498b4a6b

    • SHA1

      edb8b1cd6bf43170ecbae3c73d3bef0cd74e7728

    • SHA256

      f78dcd9565982099152691358ef070597428bb9f27c8c5ec798b1f52e479f964

    • SHA512

      faf1ea7eef93c806f499a6dbe644032f71c334e09bbbdc8eb81a5c6e2778f57633a97a57913fc3798d682680a7cdaacc042a7f1a2ed00faf40c31b273f175453

    • SSDEEP

      24576:GyeSzmwOLMk9cm03qafgsotrYlNQE55HdZ+D66Moe3GLroMl:Ve+BQBu3qU4yQEnX+2ro9Lrx

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks