Resubmissions

05/06/2023, 22:25

230605-2cclzaba67 10

05/06/2023, 22:20

230605-19jk4sbe7w 10

General

  • Target

    bf46f2c53813fdc18199e4396ea298c164b82be0c161d58f22aff30cf98772d9

  • Size

    584KB

  • Sample

    230605-2cclzaba67

  • MD5

    0578f9990e01201ff90f2f1b086a9c04

  • SHA1

    4bdf9f47b98ada21d17fccdbc8f1a30902e7c733

  • SHA256

    bf46f2c53813fdc18199e4396ea298c164b82be0c161d58f22aff30cf98772d9

  • SHA512

    f1da28d11365e329d615dd8d45212747ad8212d79210b4d15f1d3e6835fbf4d3ac83c02e11c2324f07e7afcab5bb71f1ab0f812b2e38fd7291c7a345b3372cf2

  • SSDEEP

    12288:VMrmy90u79e1wU7qDEJKDh/CZ1rC9WRutNLjfC3ur+AUr1aOFeibPx2:3yde3xJ+hYtC9WMChAUrTtLI

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19048

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      bf46f2c53813fdc18199e4396ea298c164b82be0c161d58f22aff30cf98772d9

    • Size

      584KB

    • MD5

      0578f9990e01201ff90f2f1b086a9c04

    • SHA1

      4bdf9f47b98ada21d17fccdbc8f1a30902e7c733

    • SHA256

      bf46f2c53813fdc18199e4396ea298c164b82be0c161d58f22aff30cf98772d9

    • SHA512

      f1da28d11365e329d615dd8d45212747ad8212d79210b4d15f1d3e6835fbf4d3ac83c02e11c2324f07e7afcab5bb71f1ab0f812b2e38fd7291c7a345b3372cf2

    • SSDEEP

      12288:VMrmy90u79e1wU7qDEJKDh/CZ1rC9WRutNLjfC3ur+AUr1aOFeibPx2:3yde3xJ+hYtC9WMChAUrTtLI

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks