General

  • Target

    12b3d34af554c6d9ae83b957c2276e00ced03d34b6808957e73f82a91d966df0

  • Size

    580KB

  • Sample

    230605-l6q4fsgd3v

  • MD5

    0beca576b79dd3677023bf614f5b52ba

  • SHA1

    eccde3d1890ca14afac3eeaab8593464b6b05870

  • SHA256

    12b3d34af554c6d9ae83b957c2276e00ced03d34b6808957e73f82a91d966df0

  • SHA512

    7e7a035f6e1464d1efa43ea947ae966e82c93e625f38f826f2cbdeb9d6db2b714cd234cd633a2ee1cbd4c9e0bcb8c79364ca01e9086ce59e944623bd3ca72383

  • SSDEEP

    12288:UMrly90uUUK5hwFk4JGYDXQMWRMgV9+MwbSJyyLaWu0:Zy2QXQM5qwer3u0

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19046

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      12b3d34af554c6d9ae83b957c2276e00ced03d34b6808957e73f82a91d966df0

    • Size

      580KB

    • MD5

      0beca576b79dd3677023bf614f5b52ba

    • SHA1

      eccde3d1890ca14afac3eeaab8593464b6b05870

    • SHA256

      12b3d34af554c6d9ae83b957c2276e00ced03d34b6808957e73f82a91d966df0

    • SHA512

      7e7a035f6e1464d1efa43ea947ae966e82c93e625f38f826f2cbdeb9d6db2b714cd234cd633a2ee1cbd4c9e0bcb8c79364ca01e9086ce59e944623bd3ca72383

    • SSDEEP

      12288:UMrly90uUUK5hwFk4JGYDXQMWRMgV9+MwbSJyyLaWu0:Zy2QXQM5qwer3u0

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks