General

  • Target

    7aabc42154a05f83fccaede5f92bdf3e38329b94c43e24442933f773f4a0168c

  • Size

    581KB

  • Sample

    230605-dc3amafb6y

  • MD5

    21582d79fbddc0c2c410abebe522360f

  • SHA1

    ac5ad51d93bd5f980db51072dcb08b38321bfc61

  • SHA256

    7aabc42154a05f83fccaede5f92bdf3e38329b94c43e24442933f773f4a0168c

  • SHA512

    377743cc722c90affb142e9b1998b8cef89db277ca5b6a2264657927686389f9d5bc2a1a0477d47baf9aa0f4e1661b775d03f81403313f726a1878aa68240e30

  • SSDEEP

    12288:fMrwy90khPn5bihsv9WR3vimQkLQ9DfA3CDzSzqGY:3yPn5bsyWR/I/9cSDz6qX

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19046

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      7aabc42154a05f83fccaede5f92bdf3e38329b94c43e24442933f773f4a0168c

    • Size

      581KB

    • MD5

      21582d79fbddc0c2c410abebe522360f

    • SHA1

      ac5ad51d93bd5f980db51072dcb08b38321bfc61

    • SHA256

      7aabc42154a05f83fccaede5f92bdf3e38329b94c43e24442933f773f4a0168c

    • SHA512

      377743cc722c90affb142e9b1998b8cef89db277ca5b6a2264657927686389f9d5bc2a1a0477d47baf9aa0f4e1661b775d03f81403313f726a1878aa68240e30

    • SSDEEP

      12288:fMrwy90khPn5bihsv9WR3vimQkLQ9DfA3CDzSzqGY:3yPn5bsyWR/I/9cSDz6qX

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks