General

  • Target

    2222c973663c45e0729daf0d298edcfdbda8dc4cd2bec469dbf67bd1611cea3c

  • Size

    584KB

  • Sample

    230605-y992ysag28

  • MD5

    95b42ae925756f9e4dd4270291d3773f

  • SHA1

    494ce71892b77df26fe0d67b1c47fee4314e5430

  • SHA256

    2222c973663c45e0729daf0d298edcfdbda8dc4cd2bec469dbf67bd1611cea3c

  • SHA512

    ab3e68eb74e917465bbc0d2d1d223e691e7507549e9c80e37c08be72767a81300d0b72b650d69c917bf16cc796999f4fb0df18fb608e15eba94c4a54d0ece6d8

  • SSDEEP

    12288:yMrWy90i4plCwvlRmbbPzENP4OzcZWGrCY21P6N77FGmh4SX5Z:Qy1YlCy6bEmk3oC1MN77FGcBX5Z

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19048

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      2222c973663c45e0729daf0d298edcfdbda8dc4cd2bec469dbf67bd1611cea3c

    • Size

      584KB

    • MD5

      95b42ae925756f9e4dd4270291d3773f

    • SHA1

      494ce71892b77df26fe0d67b1c47fee4314e5430

    • SHA256

      2222c973663c45e0729daf0d298edcfdbda8dc4cd2bec469dbf67bd1611cea3c

    • SHA512

      ab3e68eb74e917465bbc0d2d1d223e691e7507549e9c80e37c08be72767a81300d0b72b650d69c917bf16cc796999f4fb0df18fb608e15eba94c4a54d0ece6d8

    • SSDEEP

      12288:yMrWy90i4plCwvlRmbbPzENP4OzcZWGrCY21P6N77FGmh4SX5Z:Qy1YlCy6bEmk3oC1MN77FGcBX5Z

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks