General

  • Target

    fb1315c34f10b602ba39e593e12f2872f4b5a4e7f96cb3806572ce7859132157

  • Size

    584KB

  • Sample

    230606-f89exscb76

  • MD5

    e7e9fbd5291c2f5b74c94f6844675aff

  • SHA1

    69b25d9fab859c9fc6a3e5b6293e72c72fa8b6b2

  • SHA256

    fb1315c34f10b602ba39e593e12f2872f4b5a4e7f96cb3806572ce7859132157

  • SHA512

    4b67d7b008fafb7e331e1a42b5ef1caa3643388e4c88181cd0653ad55ba035769509c181360398810c25bf382c4247045b1564896bcfca186d2c03b5282c6858

  • SSDEEP

    12288:XMrdy90K4aT1MyBJQGw0CVj0o1gPZ+pEjajOv6d+LA:Oy5TBWGw5jxcZ+KaZA8

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19048

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      fb1315c34f10b602ba39e593e12f2872f4b5a4e7f96cb3806572ce7859132157

    • Size

      584KB

    • MD5

      e7e9fbd5291c2f5b74c94f6844675aff

    • SHA1

      69b25d9fab859c9fc6a3e5b6293e72c72fa8b6b2

    • SHA256

      fb1315c34f10b602ba39e593e12f2872f4b5a4e7f96cb3806572ce7859132157

    • SHA512

      4b67d7b008fafb7e331e1a42b5ef1caa3643388e4c88181cd0653ad55ba035769509c181360398810c25bf382c4247045b1564896bcfca186d2c03b5282c6858

    • SSDEEP

      12288:XMrdy90K4aT1MyBJQGw0CVj0o1gPZ+pEjajOv6d+LA:Oy5TBWGw5jxcZ+KaZA8

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks