General

  • Target

    43f1ecee99b59aa8ebce76a1c6c58073dc1231018c654870792e0e6175071415

  • Size

    584KB

  • Sample

    230605-t4vmvsab9s

  • MD5

    9e655a7aca4c99c09fd7b834dab4583d

  • SHA1

    d230126a5f935a8730666ebf86a044a2e679964c

  • SHA256

    43f1ecee99b59aa8ebce76a1c6c58073dc1231018c654870792e0e6175071415

  • SHA512

    a6c5f245341083eed2baed95ba2bc19e960d3c98d00f5d5fdb3872e8f575c0500ce188ff325de2b0464f04cbfe8d1dee325991892c4924e530b967de24d2acdc

  • SSDEEP

    12288:rMr0y90RhE9/YY+CPoh2kORVMLoCnKjkfXoFufGYH4BkJb:7y8h4YYPQhQGoC7f4FIkkJb

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19048

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      43f1ecee99b59aa8ebce76a1c6c58073dc1231018c654870792e0e6175071415

    • Size

      584KB

    • MD5

      9e655a7aca4c99c09fd7b834dab4583d

    • SHA1

      d230126a5f935a8730666ebf86a044a2e679964c

    • SHA256

      43f1ecee99b59aa8ebce76a1c6c58073dc1231018c654870792e0e6175071415

    • SHA512

      a6c5f245341083eed2baed95ba2bc19e960d3c98d00f5d5fdb3872e8f575c0500ce188ff325de2b0464f04cbfe8d1dee325991892c4924e530b967de24d2acdc

    • SSDEEP

      12288:rMr0y90RhE9/YY+CPoh2kORVMLoCnKjkfXoFufGYH4BkJb:7y8h4YYPQhQGoC7f4FIkkJb

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks