General

  • Target

    f7f106d576eb1f2e5d7dca4dee8dc4db077900e1607759c932f683f3b6dad99d

  • Size

    580KB

  • Sample

    230605-n9s4bsha3z

  • MD5

    999de73cc0d142a823b0e3f9e98b8d00

  • SHA1

    2e6cbabec2e7cbf4cae3653b27a955b04a4e9135

  • SHA256

    f7f106d576eb1f2e5d7dca4dee8dc4db077900e1607759c932f683f3b6dad99d

  • SHA512

    101183dff5b0a07e6261c1f35013cacf866b4302510c3b9d443208e25f352cf365a233c9bcfcec0f85133730f476c556398ca70c1a5946d2d6e68a090c290a2c

  • SSDEEP

    12288:ZMrDy90bhEvTpZY6Lz5MFiv/ZRqJwl6DeaIvg:+ySEvTbYWeW//AveaYg

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19046

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      f7f106d576eb1f2e5d7dca4dee8dc4db077900e1607759c932f683f3b6dad99d

    • Size

      580KB

    • MD5

      999de73cc0d142a823b0e3f9e98b8d00

    • SHA1

      2e6cbabec2e7cbf4cae3653b27a955b04a4e9135

    • SHA256

      f7f106d576eb1f2e5d7dca4dee8dc4db077900e1607759c932f683f3b6dad99d

    • SHA512

      101183dff5b0a07e6261c1f35013cacf866b4302510c3b9d443208e25f352cf365a233c9bcfcec0f85133730f476c556398ca70c1a5946d2d6e68a090c290a2c

    • SSDEEP

      12288:ZMrDy90bhEvTpZY6Lz5MFiv/ZRqJwl6DeaIvg:+ySEvTbYWeW//AveaYg

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks