General

  • Target

    8679fc7db7257ee7d8bcfd799002d91dfb6277a7d8abe36e5181fbf4621e5c74

  • Size

    584KB

  • Sample

    230606-e6pr3aca47

  • MD5

    bb434fa063b99ee1384f9695f7ebd61d

  • SHA1

    a6e14cd326d81bcaa333d29f2defbe6b6a0b7d12

  • SHA256

    8679fc7db7257ee7d8bcfd799002d91dfb6277a7d8abe36e5181fbf4621e5c74

  • SHA512

    54a161c021a936f2f28589123be10122904d662cc61eb68562e50d679e93c4017a596076c9934b02cfedc60106bf4791727d5ba224b2a7033aaee09cdc20c262

  • SSDEEP

    12288:lMrXy90KgNeT7rKP6c+Ds48peWnBpIH/LQ3YEbbGqbpLXHEj:Gy9gNeT3Dc/4Ke4BaH/L6YEbHtI

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19048

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      8679fc7db7257ee7d8bcfd799002d91dfb6277a7d8abe36e5181fbf4621e5c74

    • Size

      584KB

    • MD5

      bb434fa063b99ee1384f9695f7ebd61d

    • SHA1

      a6e14cd326d81bcaa333d29f2defbe6b6a0b7d12

    • SHA256

      8679fc7db7257ee7d8bcfd799002d91dfb6277a7d8abe36e5181fbf4621e5c74

    • SHA512

      54a161c021a936f2f28589123be10122904d662cc61eb68562e50d679e93c4017a596076c9934b02cfedc60106bf4791727d5ba224b2a7033aaee09cdc20c262

    • SSDEEP

      12288:lMrXy90KgNeT7rKP6c+Ds48peWnBpIH/LQ3YEbbGqbpLXHEj:Gy9gNeT3Dc/4Ke4BaH/L6YEbHtI

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks