General

  • Target

    425ed78c210d322bf2dbb6afe695c68093632809c56bcf99af00baa9cd6479e4

  • Size

    585KB

  • Sample

    230606-njgydadh2x

  • MD5

    18da7365754d4e7f7b795244721b4893

  • SHA1

    e7d48dbe6975a1a9d408bc94fdb3d112af5e93eb

  • SHA256

    425ed78c210d322bf2dbb6afe695c68093632809c56bcf99af00baa9cd6479e4

  • SHA512

    ca50e7ac67301fab07e080ef80ec9fc8c5d22210ce985e8715a884a44b6dcee2625b8d759758910eac1385d055cf9efe69f911163dfbbcbc3f377dea864020c3

  • SSDEEP

    12288:0Mrpy90ZzkDHh29LJ78h2E5i1WF+H91mfULkQhiWa:ty2Aw9t8hv4H9EMXta

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19048

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      425ed78c210d322bf2dbb6afe695c68093632809c56bcf99af00baa9cd6479e4

    • Size

      585KB

    • MD5

      18da7365754d4e7f7b795244721b4893

    • SHA1

      e7d48dbe6975a1a9d408bc94fdb3d112af5e93eb

    • SHA256

      425ed78c210d322bf2dbb6afe695c68093632809c56bcf99af00baa9cd6479e4

    • SHA512

      ca50e7ac67301fab07e080ef80ec9fc8c5d22210ce985e8715a884a44b6dcee2625b8d759758910eac1385d055cf9efe69f911163dfbbcbc3f377dea864020c3

    • SSDEEP

      12288:0Mrpy90ZzkDHh29LJ78h2E5i1WF+H91mfULkQhiWa:ty2Aw9t8hv4H9EMXta

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks