General

  • Target

    4df84afe188ed3ff8d88c8b3f0d495c8b51b4e92e75bd32371b02704d672e9ee

  • Size

    580KB

  • Sample

    230604-zwfrmaed2z

  • MD5

    b5e27c1bf5f46fbccbbd406bb8a6266b

  • SHA1

    75fe437b76379a55db91506b1bae3e9185285471

  • SHA256

    4df84afe188ed3ff8d88c8b3f0d495c8b51b4e92e75bd32371b02704d672e9ee

  • SHA512

    8226da2470b22af33a3f4da6204d5f5c0c4a04f4bd185b531abfe4822c468f9626377bac387994345057774fb8d6a01820a645ea1c3c195887c2edaef0b3cbf3

  • SSDEEP

    12288:/Mrqy90QhSkQJbIBn7Ju8uznV4LgHDBES2Z486FocRW/:tyDiKShznV40HKcFLR2

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19046

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      4df84afe188ed3ff8d88c8b3f0d495c8b51b4e92e75bd32371b02704d672e9ee

    • Size

      580KB

    • MD5

      b5e27c1bf5f46fbccbbd406bb8a6266b

    • SHA1

      75fe437b76379a55db91506b1bae3e9185285471

    • SHA256

      4df84afe188ed3ff8d88c8b3f0d495c8b51b4e92e75bd32371b02704d672e9ee

    • SHA512

      8226da2470b22af33a3f4da6204d5f5c0c4a04f4bd185b531abfe4822c468f9626377bac387994345057774fb8d6a01820a645ea1c3c195887c2edaef0b3cbf3

    • SSDEEP

      12288:/Mrqy90QhSkQJbIBn7Ju8uznV4LgHDBES2Z486FocRW/:tyDiKShznV40HKcFLR2

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks