General

  • Target

    30dddb5126a55cdc6fb11e127ca1ca69a00525685fb9809762420eac30cdf30d

  • Size

    579KB

  • Sample

    230605-sdhpyahc44

  • MD5

    a27f9f821a5fb88167ebebf10b3dadac

  • SHA1

    192fe06a6afe01717deb91ce386bd5fdea640434

  • SHA256

    30dddb5126a55cdc6fb11e127ca1ca69a00525685fb9809762420eac30cdf30d

  • SHA512

    b72892fbed1148c62aad65fb2fbefe0e4d9d11a5cfb61c524c127c6bb1cca19bb8c2a7335a017e2e1d27094c7b6a5dc4ac0d22d2fd85174266c30c807608a4b3

  • SSDEEP

    12288:VMrxy90/1GyI5mIKTmGXx4Zo0EzAoxJV4Rln9ipF3M6/R:ky0G/5CmZSJNjKfn9SZ

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19048

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      30dddb5126a55cdc6fb11e127ca1ca69a00525685fb9809762420eac30cdf30d

    • Size

      579KB

    • MD5

      a27f9f821a5fb88167ebebf10b3dadac

    • SHA1

      192fe06a6afe01717deb91ce386bd5fdea640434

    • SHA256

      30dddb5126a55cdc6fb11e127ca1ca69a00525685fb9809762420eac30cdf30d

    • SHA512

      b72892fbed1148c62aad65fb2fbefe0e4d9d11a5cfb61c524c127c6bb1cca19bb8c2a7335a017e2e1d27094c7b6a5dc4ac0d22d2fd85174266c30c807608a4b3

    • SSDEEP

      12288:VMrxy90/1GyI5mIKTmGXx4Zo0EzAoxJV4Rln9ipF3M6/R:ky0G/5CmZSJNjKfn9SZ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks