General

  • Target

    682c3f56ff74856733635ff97294009a055cdc4af34561c0a6023f7d557258da

  • Size

    592KB

  • Sample

    230608-gl8esadd2t

  • MD5

    1c9261053cc2e146235fd2bd416609be

  • SHA1

    257cc583340f18405ab49499e3bbcd465597a2ca

  • SHA256

    682c3f56ff74856733635ff97294009a055cdc4af34561c0a6023f7d557258da

  • SHA512

    32dcaf2488ac66b43c814ed9466557c26c1967ff6c493eaa8cfc1b1cb9a0f65e7c638a7ca2e171b68af3ac36ebb505937a5e6d774d1a923cc20beeba48dd7afe

  • SSDEEP

    12288:OMrty90odAEW7TUgyljQLTjA9bOqX3l5NuJDe0x1V+Fg2lU5DX:DyNiT9aYCbtl5NWejFUJX

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.129:19068

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      682c3f56ff74856733635ff97294009a055cdc4af34561c0a6023f7d557258da

    • Size

      592KB

    • MD5

      1c9261053cc2e146235fd2bd416609be

    • SHA1

      257cc583340f18405ab49499e3bbcd465597a2ca

    • SHA256

      682c3f56ff74856733635ff97294009a055cdc4af34561c0a6023f7d557258da

    • SHA512

      32dcaf2488ac66b43c814ed9466557c26c1967ff6c493eaa8cfc1b1cb9a0f65e7c638a7ca2e171b68af3ac36ebb505937a5e6d774d1a923cc20beeba48dd7afe

    • SSDEEP

      12288:OMrty90odAEW7TUgyljQLTjA9bOqX3l5NuJDe0x1V+Fg2lU5DX:DyNiT9aYCbtl5NWejFUJX

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks