General

  • Target

    402d6dbd53c4a93797c5974af9a7e72c305c961d2c17d15d11e8ef2c3f06a83b

  • Size

    584KB

  • Sample

    230605-wvw6faaa87

  • MD5

    af3a39282057f18d94264c113b21d381

  • SHA1

    824b50d5c7b6e99eb312fd337c0aac1c70b00e89

  • SHA256

    402d6dbd53c4a93797c5974af9a7e72c305c961d2c17d15d11e8ef2c3f06a83b

  • SHA512

    73afb48aa3320790db6c535b4459e27e2068dbef07d8205bf604c68c70c8db8a3b0c2a91149405c40cfc3b24c408b94ce1f91e4907b48391912c1f2f5ce1b0d2

  • SSDEEP

    12288:jMrIy90ZtggR10NjqO0MUAS5luPsF5HopAS6tQDI/X:LysOg+GO0MUtuPOZopba0y

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19048

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      402d6dbd53c4a93797c5974af9a7e72c305c961d2c17d15d11e8ef2c3f06a83b

    • Size

      584KB

    • MD5

      af3a39282057f18d94264c113b21d381

    • SHA1

      824b50d5c7b6e99eb312fd337c0aac1c70b00e89

    • SHA256

      402d6dbd53c4a93797c5974af9a7e72c305c961d2c17d15d11e8ef2c3f06a83b

    • SHA512

      73afb48aa3320790db6c535b4459e27e2068dbef07d8205bf604c68c70c8db8a3b0c2a91149405c40cfc3b24c408b94ce1f91e4907b48391912c1f2f5ce1b0d2

    • SSDEEP

      12288:jMrIy90ZtggR10NjqO0MUAS5luPsF5HopAS6tQDI/X:LysOg+GO0MUtuPOZopba0y

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks