General

  • Target

    c838bc7b30b1ab71ea6041557d13a07bfcd6aef3bbc924f63352a3281afabf7b

  • Size

    578KB

  • Sample

    230607-qd156sbc9w

  • MD5

    580e89637928986d7669d7ab0abefbb1

  • SHA1

    dbd3edaa7a62807645564f63d09c75e3ffd8d83b

  • SHA256

    c838bc7b30b1ab71ea6041557d13a07bfcd6aef3bbc924f63352a3281afabf7b

  • SHA512

    60f1de2a056d7b518c7f2ed22693bf128ae5d0da573f977805e2dbfeeb5a343d728f0ac50f607ef60b9acf3dfe81b217016fe4b9e82743aa531d14cf10d0bede

  • SSDEEP

    12288:PMrIy90BNheBLidZ6rkvlovFm6fqZ5szi71kiX6WdQsETY/:3y0NhUk4JDijsJQ/QS/

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.129:19068

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      c838bc7b30b1ab71ea6041557d13a07bfcd6aef3bbc924f63352a3281afabf7b

    • Size

      578KB

    • MD5

      580e89637928986d7669d7ab0abefbb1

    • SHA1

      dbd3edaa7a62807645564f63d09c75e3ffd8d83b

    • SHA256

      c838bc7b30b1ab71ea6041557d13a07bfcd6aef3bbc924f63352a3281afabf7b

    • SHA512

      60f1de2a056d7b518c7f2ed22693bf128ae5d0da573f977805e2dbfeeb5a343d728f0ac50f607ef60b9acf3dfe81b217016fe4b9e82743aa531d14cf10d0bede

    • SSDEEP

      12288:PMrIy90BNheBLidZ6rkvlovFm6fqZ5szi71kiX6WdQsETY/:3y0NhUk4JDijsJQ/QS/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks