General

  • Target

    20fe8fbf9b55c637bbb62a34df4886f0.bin

  • Size

    537KB

  • Sample

    230606-bga1tsbd58

  • MD5

    982e20c62a1242cdd9f1762d105e9821

  • SHA1

    75bd7ed6734fcf58d35bf14161406dd4870dcd69

  • SHA256

    5dbe71d6ac567e5f0cf0b558ecc307601660bdf5c22b077be8d1fd177ad1fa7f

  • SHA512

    ee642d05be8c2f88dd9002b77cea792009ec5d699288a60c13e9b04f17e24489ffe60b4fee3cea60d3e3d44b1911f452ccfbb3254375600b43d549016b7e3a36

  • SSDEEP

    12288:p70gobHA0WoyI2LTSbnhCwsdmjWIGSRW13MMWnThlUuo+K:BOg9vTSbnfAvRKnThyu7K

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19046

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      d08d7b4165fce25e8099f696e0d600f2e737498add7d71bbe3a1466015eb542b.exe

    • Size

      581KB

    • MD5

      20fe8fbf9b55c637bbb62a34df4886f0

    • SHA1

      6cd1fdc64a25e290346280164806d4f7fb8783e2

    • SHA256

      d08d7b4165fce25e8099f696e0d600f2e737498add7d71bbe3a1466015eb542b

    • SHA512

      4b8bd6a624112e7723e5c4d451512b18dcfbc59e07923150e9e8a772ce72ffae46f978c91672ce27f604cd1da2aa07c36c3ce17aa2843b94be388a1494177942

    • SSDEEP

      12288:kMr2y90Nj5xQa0v7+WLGGnO5H60mydcqJ2MPHn/pD8AL:iyCjIvapGnOtdmydnQ4Hn/SAL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks