General

  • Target

    847740ce2a69a307506aa484854ff406ade657483e400e8f07a01ba1e44d1477

  • Size

    580KB

  • Sample

    230604-3b5f2aef5t

  • MD5

    0a062e443a478d9d54a0d21995d0e2dd

  • SHA1

    ef96cab46ba74cef8aa09a6a6516b55cd8d998a7

  • SHA256

    847740ce2a69a307506aa484854ff406ade657483e400e8f07a01ba1e44d1477

  • SHA512

    a20a8f29bf99bcfb89ad66efe16b6c2bb568fff3f7b317094cfc704899b2370ddb65a7cda451f7481007929d2ab2a53181df879bcbc741ea69d55359b0f2bab6

  • SSDEEP

    12288:SMrgy90fBIMzI+Fl73GA5P+pkT6tJkI6:my4BIqI+P73GA6B6

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19046

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      847740ce2a69a307506aa484854ff406ade657483e400e8f07a01ba1e44d1477

    • Size

      580KB

    • MD5

      0a062e443a478d9d54a0d21995d0e2dd

    • SHA1

      ef96cab46ba74cef8aa09a6a6516b55cd8d998a7

    • SHA256

      847740ce2a69a307506aa484854ff406ade657483e400e8f07a01ba1e44d1477

    • SHA512

      a20a8f29bf99bcfb89ad66efe16b6c2bb568fff3f7b317094cfc704899b2370ddb65a7cda451f7481007929d2ab2a53181df879bcbc741ea69d55359b0f2bab6

    • SSDEEP

      12288:SMrgy90fBIMzI+Fl73GA5P+pkT6tJkI6:my4BIqI+P73GA6B6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks