General

  • Target

    e7a0061ea8c8342c48bc9f48c036faa56236d94031d84eab468ae39fca183b3b

  • Size

    583KB

  • Sample

    230606-cttt5scc71

  • MD5

    cef1493173c08ac6dddd112b700d5115

  • SHA1

    f613e78d0f1965b01cec55e1bcc31c98c9c62992

  • SHA256

    e7a0061ea8c8342c48bc9f48c036faa56236d94031d84eab468ae39fca183b3b

  • SHA512

    c639e1aad55842b0a12341c7a74d005f5beed4d4dedd018b60f13fdbdd9cbcdaa4627a7837ccd8fbf3be177025f6a7b9b838bd56e1ea854e5d6f513904f42648

  • SSDEEP

    12288:2Mrgy90006arjdFf6eM09muG8THB6r5WsqLuQ:ay107r6lqmunTEssxQ

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19048

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      e7a0061ea8c8342c48bc9f48c036faa56236d94031d84eab468ae39fca183b3b

    • Size

      583KB

    • MD5

      cef1493173c08ac6dddd112b700d5115

    • SHA1

      f613e78d0f1965b01cec55e1bcc31c98c9c62992

    • SHA256

      e7a0061ea8c8342c48bc9f48c036faa56236d94031d84eab468ae39fca183b3b

    • SHA512

      c639e1aad55842b0a12341c7a74d005f5beed4d4dedd018b60f13fdbdd9cbcdaa4627a7837ccd8fbf3be177025f6a7b9b838bd56e1ea854e5d6f513904f42648

    • SSDEEP

      12288:2Mrgy90006arjdFf6eM09muG8THB6r5WsqLuQ:ay107r6lqmunTEssxQ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks