General

  • Target

    0f45ebf9c23d99bf17fa0a32e1d42a05b263dc1187852b89b56f104cdcbc9e57

  • Size

    584KB

  • Sample

    230605-zksbaaag62

  • MD5

    d0252f685e5f96cbbde6df3c576374fe

  • SHA1

    513f140cf41a339f7a966d7744fe9ba64196bf3e

  • SHA256

    0f45ebf9c23d99bf17fa0a32e1d42a05b263dc1187852b89b56f104cdcbc9e57

  • SHA512

    346ebc0050a4d21cfb2699ec5b1bd6af2a397b7787ac3bba3bc2bd50d79dfc86a085bee767c97228b001f4ce61a543ad31402edbef0adde317ffe3fcd56b6fd3

  • SSDEEP

    12288:AMrQy9089KKDw7Wp4xVMEFZP/t0hPSGEUbVflHJSyW:gynlsya5IRE8fW

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19048

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      0f45ebf9c23d99bf17fa0a32e1d42a05b263dc1187852b89b56f104cdcbc9e57

    • Size

      584KB

    • MD5

      d0252f685e5f96cbbde6df3c576374fe

    • SHA1

      513f140cf41a339f7a966d7744fe9ba64196bf3e

    • SHA256

      0f45ebf9c23d99bf17fa0a32e1d42a05b263dc1187852b89b56f104cdcbc9e57

    • SHA512

      346ebc0050a4d21cfb2699ec5b1bd6af2a397b7787ac3bba3bc2bd50d79dfc86a085bee767c97228b001f4ce61a543ad31402edbef0adde317ffe3fcd56b6fd3

    • SSDEEP

      12288:AMrQy9089KKDw7Wp4xVMEFZP/t0hPSGEUbVflHJSyW:gynlsya5IRE8fW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks