General

  • Target

    995253e531eb4b6593c38a7f571916be8e8264916306748e80724544a3f048bb

  • Size

    585KB

  • Sample

    230606-ksfj5ach22

  • MD5

    9ea9510dcca957afc5cb58f5eb336f72

  • SHA1

    25553249a5a5aa1882a63dc614ca3a7274818cbe

  • SHA256

    995253e531eb4b6593c38a7f571916be8e8264916306748e80724544a3f048bb

  • SHA512

    e6f36be6f21af78ec5465f0108300663507e225067901509d9cedfdeb5798309ff982d04fd0558b1c2545559bb0fb113a700d147b3635b14f6f3ba5a89635105

  • SSDEEP

    12288:vMrZy90Q+6hU92jiqXKZSRDHGmoOqTU89r+k2l6hMqNcLJ:iyBRfKkRDHGmoOyZMCM

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19048

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      995253e531eb4b6593c38a7f571916be8e8264916306748e80724544a3f048bb

    • Size

      585KB

    • MD5

      9ea9510dcca957afc5cb58f5eb336f72

    • SHA1

      25553249a5a5aa1882a63dc614ca3a7274818cbe

    • SHA256

      995253e531eb4b6593c38a7f571916be8e8264916306748e80724544a3f048bb

    • SHA512

      e6f36be6f21af78ec5465f0108300663507e225067901509d9cedfdeb5798309ff982d04fd0558b1c2545559bb0fb113a700d147b3635b14f6f3ba5a89635105

    • SSDEEP

      12288:vMrZy90Q+6hU92jiqXKZSRDHGmoOqTU89r+k2l6hMqNcLJ:iyBRfKkRDHGmoOyZMCM

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks