General

  • Target

    445a66affe8e7ac34a9566af9e28ee3631086479eddeb5cce320f463820bfb72

  • Size

    580KB

  • Sample

    230605-qhlw2shd3z

  • MD5

    e91d6268d2c30afaed0e8217d3af7281

  • SHA1

    d62df6fe1c2a46dd179cc7cf745e35a979ca712e

  • SHA256

    445a66affe8e7ac34a9566af9e28ee3631086479eddeb5cce320f463820bfb72

  • SHA512

    6c9acd0958f945b2498bae0c0268f2258b80513afb340d9e1aa922529e8e30b84e0fab5e3165c6e335ebefd22dfce20c448b5bea7166a9f21671b893a658e58c

  • SSDEEP

    12288:YMrGy90ftO9wbOh1fVTuY1KCdENPJn+lMhagM:eyOO+bUuidd+PJn+Kh6

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19048

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      445a66affe8e7ac34a9566af9e28ee3631086479eddeb5cce320f463820bfb72

    • Size

      580KB

    • MD5

      e91d6268d2c30afaed0e8217d3af7281

    • SHA1

      d62df6fe1c2a46dd179cc7cf745e35a979ca712e

    • SHA256

      445a66affe8e7ac34a9566af9e28ee3631086479eddeb5cce320f463820bfb72

    • SHA512

      6c9acd0958f945b2498bae0c0268f2258b80513afb340d9e1aa922529e8e30b84e0fab5e3165c6e335ebefd22dfce20c448b5bea7166a9f21671b893a658e58c

    • SSDEEP

      12288:YMrGy90ftO9wbOh1fVTuY1KCdENPJn+lMhagM:eyOO+bUuidd+PJn+Kh6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks