General

  • Target

    d3298e33df1052b3af424cff4a972a9b228f8fc0aace1234575eacde90091395

  • Size

    584KB

  • Sample

    230606-gxhcqscc37

  • MD5

    f9e8b9b032e1706b4bbedceb716a0060

  • SHA1

    586dd8f7b8cf7f88bab323cb80ea7fac262b4095

  • SHA256

    d3298e33df1052b3af424cff4a972a9b228f8fc0aace1234575eacde90091395

  • SHA512

    e880ec50b4c2f75a89e0a3bad9bde6334ad22ebd9a7acb314bd7075f78b3022c1db241b3b33fbbf9396b965ee9a09c16444410d9b303538c16160ea44be282ce

  • SSDEEP

    12288:PMrsy90BSk8D2Bj3cNWGJXf1ydvAb980UyjcFpdCzam3:7ywSZ2l3cN1FfAggLdCza0

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19048

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      d3298e33df1052b3af424cff4a972a9b228f8fc0aace1234575eacde90091395

    • Size

      584KB

    • MD5

      f9e8b9b032e1706b4bbedceb716a0060

    • SHA1

      586dd8f7b8cf7f88bab323cb80ea7fac262b4095

    • SHA256

      d3298e33df1052b3af424cff4a972a9b228f8fc0aace1234575eacde90091395

    • SHA512

      e880ec50b4c2f75a89e0a3bad9bde6334ad22ebd9a7acb314bd7075f78b3022c1db241b3b33fbbf9396b965ee9a09c16444410d9b303538c16160ea44be282ce

    • SSDEEP

      12288:PMrsy90BSk8D2Bj3cNWGJXf1ydvAb980UyjcFpdCzam3:7ywSZ2l3cN1FfAggLdCza0

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks