General

  • Target

    86e5f1cbe7911a4dd810972920ed658d29040960d5d9864ffe33cce1636ffda2

  • Size

    580KB

  • Sample

    230604-wfww5adf2y

  • MD5

    235f261407e62a3592611f63da094322

  • SHA1

    06bf43a653da6117fa3ddb36d317c9c611ea89be

  • SHA256

    86e5f1cbe7911a4dd810972920ed658d29040960d5d9864ffe33cce1636ffda2

  • SHA512

    7e2dd4401ee17fcdb7a94ec916d89152b89ced5349b09e107d03fe262da1d44e9742f3291a5721f43d6d33363e9ffd4907e6681e9eeffc97fb32593b3f6f84c5

  • SSDEEP

    12288:8MrHy90YPKDMAGXYwp1cIG/YaSdVzWmvU:byTGGZp6/YHV8

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19046

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      86e5f1cbe7911a4dd810972920ed658d29040960d5d9864ffe33cce1636ffda2

    • Size

      580KB

    • MD5

      235f261407e62a3592611f63da094322

    • SHA1

      06bf43a653da6117fa3ddb36d317c9c611ea89be

    • SHA256

      86e5f1cbe7911a4dd810972920ed658d29040960d5d9864ffe33cce1636ffda2

    • SHA512

      7e2dd4401ee17fcdb7a94ec916d89152b89ced5349b09e107d03fe262da1d44e9742f3291a5721f43d6d33363e9ffd4907e6681e9eeffc97fb32593b3f6f84c5

    • SSDEEP

      12288:8MrHy90YPKDMAGXYwp1cIG/YaSdVzWmvU:byTGGZp6/YHV8

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks