General

  • Target

    f920a6d6270e6df2ba3848343583afa75ab9e106407788fdacc0f3c5c77dd434

  • Size

    584KB

  • Sample

    230606-cwqv9scc8y

  • MD5

    3f41a156e6b9b0ecb55175e07ceea99e

  • SHA1

    60baa30c8fa5fb3cb4c8c15df721cf0729bfdc99

  • SHA256

    f920a6d6270e6df2ba3848343583afa75ab9e106407788fdacc0f3c5c77dd434

  • SHA512

    a9f6682d2460629a7eade3ef08da7d699ce90a408e8f2814fe4435714a609ef31e76c96d6b66cc92811797cfd8bed6397792d836c0d0cb8643dbfe1567b7332e

  • SSDEEP

    12288:VMr3y90NarzwdE3MR4VHwm2go+eBgmhysRV540T9hw0pn:OyaUeEF8oe+4BVVs0n

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19048

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      f920a6d6270e6df2ba3848343583afa75ab9e106407788fdacc0f3c5c77dd434

    • Size

      584KB

    • MD5

      3f41a156e6b9b0ecb55175e07ceea99e

    • SHA1

      60baa30c8fa5fb3cb4c8c15df721cf0729bfdc99

    • SHA256

      f920a6d6270e6df2ba3848343583afa75ab9e106407788fdacc0f3c5c77dd434

    • SHA512

      a9f6682d2460629a7eade3ef08da7d699ce90a408e8f2814fe4435714a609ef31e76c96d6b66cc92811797cfd8bed6397792d836c0d0cb8643dbfe1567b7332e

    • SSDEEP

      12288:VMr3y90NarzwdE3MR4VHwm2go+eBgmhysRV540T9hw0pn:OyaUeEF8oe+4BVVs0n

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks