General

  • Target

    ab6cc155436b69ca35f8fb413658f8c68e31f069a62119f6ad96af6b57211e01

  • Size

    579KB

  • Sample

    230605-jkpmdsfd58

  • MD5

    b39818dac1620ea6639210d6a03a0102

  • SHA1

    5dcfc0bcc148174d811cf43a2e4671c4d8f72385

  • SHA256

    ab6cc155436b69ca35f8fb413658f8c68e31f069a62119f6ad96af6b57211e01

  • SHA512

    8bc5e31be36e264474a5777f00ccd8f0b4618e880a0ff2ba56c8093d57b28678236abdf322016b9a362426e0440b7c19c7c52a0f80c17e33b359831abd0b59e8

  • SSDEEP

    12288:XMrWy90cWjjCQn4O/kiKcxKagsoGrgGSNXG6+W57y2l5:RyoJ5dYtsHrgGSFGOdJ5

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19046

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      ab6cc155436b69ca35f8fb413658f8c68e31f069a62119f6ad96af6b57211e01

    • Size

      579KB

    • MD5

      b39818dac1620ea6639210d6a03a0102

    • SHA1

      5dcfc0bcc148174d811cf43a2e4671c4d8f72385

    • SHA256

      ab6cc155436b69ca35f8fb413658f8c68e31f069a62119f6ad96af6b57211e01

    • SHA512

      8bc5e31be36e264474a5777f00ccd8f0b4618e880a0ff2ba56c8093d57b28678236abdf322016b9a362426e0440b7c19c7c52a0f80c17e33b359831abd0b59e8

    • SSDEEP

      12288:XMrWy90cWjjCQn4O/kiKcxKagsoGrgGSNXG6+W57y2l5:RyoJ5dYtsHrgGSFGOdJ5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks