General

  • Target

    8a45be8b14d58741586b07c2899a3d1789ac9b2fea7a3bbddbb103048d123e64

  • Size

    581KB

  • Sample

    230605-fld1hafd7z

  • MD5

    616f8396421dfafab335cc19078a7340

  • SHA1

    06e8cd46b3c14d456641a3004cdb2e12afa4ee15

  • SHA256

    8a45be8b14d58741586b07c2899a3d1789ac9b2fea7a3bbddbb103048d123e64

  • SHA512

    d83e34d5be669506ccb58cbf934b672ebe93b9f798dfa47ccbee015be1e19ff97b53c47e431434b94c621ca7b46f1ffabef7325b3332156dc823ebf5de15398c

  • SSDEEP

    12288:EMr4y90pbl1iD1elR0BBkg8qmaLDwEEoBl0OnpWcE:cyk/61rk5a3JnMcE

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19046

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      8a45be8b14d58741586b07c2899a3d1789ac9b2fea7a3bbddbb103048d123e64

    • Size

      581KB

    • MD5

      616f8396421dfafab335cc19078a7340

    • SHA1

      06e8cd46b3c14d456641a3004cdb2e12afa4ee15

    • SHA256

      8a45be8b14d58741586b07c2899a3d1789ac9b2fea7a3bbddbb103048d123e64

    • SHA512

      d83e34d5be669506ccb58cbf934b672ebe93b9f798dfa47ccbee015be1e19ff97b53c47e431434b94c621ca7b46f1ffabef7325b3332156dc823ebf5de15398c

    • SSDEEP

      12288:EMr4y90pbl1iD1elR0BBkg8qmaLDwEEoBl0OnpWcE:cyk/61rk5a3JnMcE

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks