General

  • Target

    b04d61bd7fe0ebf05fdb919dc22cb1303c5a2aa62eaba6362e5fc00726b9b03e

  • Size

    585KB

  • Sample

    230606-qb3k8aec6t

  • MD5

    62398f98b885648f70760ebe199379c8

  • SHA1

    3a0f4609aae7a3abeb81670ce2eab4532c579d3f

  • SHA256

    b04d61bd7fe0ebf05fdb919dc22cb1303c5a2aa62eaba6362e5fc00726b9b03e

  • SHA512

    d5855072f39adcb68f2c961bc0f16c53d16d6d85e2ef769d9a09a8ee78d62e7fa89c25e8870d62d358cfab63d623135b19255ff8e9a2d9b2719e38a73e59eb14

  • SSDEEP

    12288:cMr8y90uv1V/tsUcsh0BniPDK1jGhCk0Z/ib15mVE4cT7:wynVVPcw0BniIGkk0A1cLcn

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19048

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      b04d61bd7fe0ebf05fdb919dc22cb1303c5a2aa62eaba6362e5fc00726b9b03e

    • Size

      585KB

    • MD5

      62398f98b885648f70760ebe199379c8

    • SHA1

      3a0f4609aae7a3abeb81670ce2eab4532c579d3f

    • SHA256

      b04d61bd7fe0ebf05fdb919dc22cb1303c5a2aa62eaba6362e5fc00726b9b03e

    • SHA512

      d5855072f39adcb68f2c961bc0f16c53d16d6d85e2ef769d9a09a8ee78d62e7fa89c25e8870d62d358cfab63d623135b19255ff8e9a2d9b2719e38a73e59eb14

    • SSDEEP

      12288:cMr8y90uv1V/tsUcsh0BniPDK1jGhCk0Z/ib15mVE4cT7:wynVVPcw0BniIGkk0A1cLcn

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks