General

  • Target

    8ae912f5e3fd10e8efb28f592129b89169c4b42f2b812ee66e73efc1faefa94b

  • Size

    583KB

  • Sample

    230606-avreasbh6x

  • MD5

    0d65a6a2d29b70bf7b77f28762cf6129

  • SHA1

    78a0320bc3427f6c0dd5ff935faedc2d451cfc36

  • SHA256

    8ae912f5e3fd10e8efb28f592129b89169c4b42f2b812ee66e73efc1faefa94b

  • SHA512

    00ac0eaf85ac9fae1d897492e3f096498749221cf8f735b8c8bc519280380f68e305bfaae626d28614bf173b1e9f1d0da314d83555adc57db2baeaed5e325d56

  • SSDEEP

    12288:iMrNy90m/SsiJdFkf7wJeLtRckJfp5+cdK4WQasIV:DytsUf0IDzAEWff

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19048

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      8ae912f5e3fd10e8efb28f592129b89169c4b42f2b812ee66e73efc1faefa94b

    • Size

      583KB

    • MD5

      0d65a6a2d29b70bf7b77f28762cf6129

    • SHA1

      78a0320bc3427f6c0dd5ff935faedc2d451cfc36

    • SHA256

      8ae912f5e3fd10e8efb28f592129b89169c4b42f2b812ee66e73efc1faefa94b

    • SHA512

      00ac0eaf85ac9fae1d897492e3f096498749221cf8f735b8c8bc519280380f68e305bfaae626d28614bf173b1e9f1d0da314d83555adc57db2baeaed5e325d56

    • SSDEEP

      12288:iMrNy90m/SsiJdFkf7wJeLtRckJfp5+cdK4WQasIV:DytsUf0IDzAEWff

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks