General

  • Target

    da8fcde10abb4d4a5fcf819e839811667795a72a48b07dad24d68f92eca2991e

  • Size

    580KB

  • Sample

    230604-xgh74adb46

  • MD5

    ab03e1d4641686bc329fc2b44f0ab8e5

  • SHA1

    903269a8b77eb0367973d744259578195b23adcf

  • SHA256

    da8fcde10abb4d4a5fcf819e839811667795a72a48b07dad24d68f92eca2991e

  • SHA512

    4aab7a5f54c4a06954a01a332c0c052fb421d51162c45b717778f1742e736bee1e885d1834d2bde114c413d1fcef7ab3c9479d2de5f0ae60590a4927d81cf91d

  • SSDEEP

    12288:+MrGy90nz+X1l5wSqnmqKtZbnVB4zf04QpckU0yRIYY:8y6aX1XkGtJnVBKfkcoyur

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19046

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      da8fcde10abb4d4a5fcf819e839811667795a72a48b07dad24d68f92eca2991e

    • Size

      580KB

    • MD5

      ab03e1d4641686bc329fc2b44f0ab8e5

    • SHA1

      903269a8b77eb0367973d744259578195b23adcf

    • SHA256

      da8fcde10abb4d4a5fcf819e839811667795a72a48b07dad24d68f92eca2991e

    • SHA512

      4aab7a5f54c4a06954a01a332c0c052fb421d51162c45b717778f1742e736bee1e885d1834d2bde114c413d1fcef7ab3c9479d2de5f0ae60590a4927d81cf91d

    • SSDEEP

      12288:+MrGy90nz+X1l5wSqnmqKtZbnVB4zf04QpckU0yRIYY:8y6aX1XkGtJnVBKfkcoyur

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks