General

  • Target

    8b66eb481dedac7ba0bff38cedef39f13dbf7928f41c4b56167472137c458a5b

  • Size

    592KB

  • Sample

    230608-gq5jpacg95

  • MD5

    137f782e5984d6915659cbe099882784

  • SHA1

    90b96c04cb1e2f17e8edb4849fa5310893fe2fb9

  • SHA256

    8b66eb481dedac7ba0bff38cedef39f13dbf7928f41c4b56167472137c458a5b

  • SHA512

    21c3142fc1d994c04ad0cc40f5c51ba5f5d709514fd61f4e7cd69c0395d2913a87836c4beedcca5a0044b38dcd00ed09c11cb81fe293578d8e422c41e4a4aead

  • SSDEEP

    12288:1MrOy90WFf5OGnUWr9ZuMVi/Nj4lKv+ARmhSoS1lH:7ynhOGlPHU14omCmgoS1x

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.129:19068

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      8b66eb481dedac7ba0bff38cedef39f13dbf7928f41c4b56167472137c458a5b

    • Size

      592KB

    • MD5

      137f782e5984d6915659cbe099882784

    • SHA1

      90b96c04cb1e2f17e8edb4849fa5310893fe2fb9

    • SHA256

      8b66eb481dedac7ba0bff38cedef39f13dbf7928f41c4b56167472137c458a5b

    • SHA512

      21c3142fc1d994c04ad0cc40f5c51ba5f5d709514fd61f4e7cd69c0395d2913a87836c4beedcca5a0044b38dcd00ed09c11cb81fe293578d8e422c41e4a4aead

    • SSDEEP

      12288:1MrOy90WFf5OGnUWr9ZuMVi/Nj4lKv+ARmhSoS1lH:7ynhOGlPHU14omCmgoS1x

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks