General

  • Target

    b39e87b6113fd5c3561cac2303a1ef9848986595c7bd944f888e93860ed239d8

  • Size

    585KB

  • Sample

    230606-w378nsfe8t

  • MD5

    207f0ab5dfa655be03a64cc9f60a481e

  • SHA1

    4425f4a223b79deb99db48687ac8dfe61469d473

  • SHA256

    b39e87b6113fd5c3561cac2303a1ef9848986595c7bd944f888e93860ed239d8

  • SHA512

    8f1cef00cb5b38697f4458239e56854a3ea35fd32c563013827fc6775b76488f9e2addbc8e01f4b55bde30ea7bff6d62eaf6548054dbd718c30d5e054c067926

  • SSDEEP

    12288:bMr6y9089YlQLdIxIjL4t4GykSY4Q1QzU+1ytVbTQIaGQuB8KEbQmR:hyklKYtt/j1QzPOVbTQBpKEbQC

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19048

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      b39e87b6113fd5c3561cac2303a1ef9848986595c7bd944f888e93860ed239d8

    • Size

      585KB

    • MD5

      207f0ab5dfa655be03a64cc9f60a481e

    • SHA1

      4425f4a223b79deb99db48687ac8dfe61469d473

    • SHA256

      b39e87b6113fd5c3561cac2303a1ef9848986595c7bd944f888e93860ed239d8

    • SHA512

      8f1cef00cb5b38697f4458239e56854a3ea35fd32c563013827fc6775b76488f9e2addbc8e01f4b55bde30ea7bff6d62eaf6548054dbd718c30d5e054c067926

    • SSDEEP

      12288:bMr6y9089YlQLdIxIjL4t4GykSY4Q1QzU+1ytVbTQIaGQuB8KEbQmR:hyklKYtt/j1QzPOVbTQBpKEbQC

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks