General

  • Target

    977b2eb0222cd54da6a56abc17715838759486391dde8ac85c5bcc368f6dd635

  • Size

    580KB

  • Sample

    230605-b836pafa41

  • MD5

    452489a1150425131ed17dbfe2c0ca39

  • SHA1

    fb7023bb777ec8971e4f2de371d574beceda87ba

  • SHA256

    977b2eb0222cd54da6a56abc17715838759486391dde8ac85c5bcc368f6dd635

  • SHA512

    16912a8046fd41dd501e604f19bd4b6e0341787aafff3aac324d34e9c6d3e33b403a38edb49d631747ac7008041d466a8cc3ab2a23359bf8e4353e983adfa0d5

  • SSDEEP

    12288:SMrYy90+xeBwhCxCVeshK4WaJkgqJ1OW8S+XoPspUx8a/:+yneBmbEgqyHSg0EUx8a/

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19046

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      977b2eb0222cd54da6a56abc17715838759486391dde8ac85c5bcc368f6dd635

    • Size

      580KB

    • MD5

      452489a1150425131ed17dbfe2c0ca39

    • SHA1

      fb7023bb777ec8971e4f2de371d574beceda87ba

    • SHA256

      977b2eb0222cd54da6a56abc17715838759486391dde8ac85c5bcc368f6dd635

    • SHA512

      16912a8046fd41dd501e604f19bd4b6e0341787aafff3aac324d34e9c6d3e33b403a38edb49d631747ac7008041d466a8cc3ab2a23359bf8e4353e983adfa0d5

    • SSDEEP

      12288:SMrYy90+xeBwhCxCVeshK4WaJkgqJ1OW8S+XoPspUx8a/:+yneBmbEgqyHSg0EUx8a/

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks