Resubmissions

04/06/2023, 19:25

230604-x49nkadd62 10

04/06/2023, 19:16

230604-xyxf2sdh9v 10

General

  • Target

    fe8656855a1318e7c373c588021ac41e01a8c25d0eb14d11ee5166f858f11448

  • Size

    580KB

  • Sample

    230604-xyxf2sdh9v

  • MD5

    7de7eb8be918cb898e6b38ac6d04898f

  • SHA1

    f6a281dbfac83073dcd679ee0ade72dd9ee357dc

  • SHA256

    fe8656855a1318e7c373c588021ac41e01a8c25d0eb14d11ee5166f858f11448

  • SHA512

    e3d25d05da377c48845f3104171199e1699b2915f049e43fbe14f3a008dc7da1de5e714cc0990d3933e67381d2616d85fb380722945422c1a949ac5daa9fa1f3

  • SSDEEP

    12288:mMrIy9056mGJk1tZhg+1Smzw2snTfLMSP7d8bOZ4x8SKR:qytmGJulxSR2sTfpP7eCOxhS

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19046

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      fe8656855a1318e7c373c588021ac41e01a8c25d0eb14d11ee5166f858f11448

    • Size

      580KB

    • MD5

      7de7eb8be918cb898e6b38ac6d04898f

    • SHA1

      f6a281dbfac83073dcd679ee0ade72dd9ee357dc

    • SHA256

      fe8656855a1318e7c373c588021ac41e01a8c25d0eb14d11ee5166f858f11448

    • SHA512

      e3d25d05da377c48845f3104171199e1699b2915f049e43fbe14f3a008dc7da1de5e714cc0990d3933e67381d2616d85fb380722945422c1a949ac5daa9fa1f3

    • SSDEEP

      12288:mMrIy9056mGJk1tZhg+1Smzw2snTfLMSP7d8bOZ4x8SKR:qytmGJulxSR2sTfpP7eCOxhS

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks