General

  • Target

    3e718df1bca021ecfccdcb6464dfc2ba08323af4fca7d9cc6d330b8a5ed132bd

  • Size

    570KB

  • Sample

    230308-nz3j1sgb56

  • MD5

    97c0e0d08214675b63562dad5ba1e123

  • SHA1

    08f935c66ecd751197bbd73f0d39bfbcbe8736d2

  • SHA256

    3e718df1bca021ecfccdcb6464dfc2ba08323af4fca7d9cc6d330b8a5ed132bd

  • SHA512

    98d672f89ea0c8769a5307c8d56dff7381b1496a3b49cd7aea91d96b89c72e4b1c21a732caf0a7bae45758fe4faf24faa5583ad594cfd2b146fa932172888daa

  • SSDEEP

    12288:4Mrxy90Pahimz7AuxqV2KnxfUEQBOMel19QdS2QPeY3:5ySsVAuxYfnq7UMgsdSzPv

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Targets

    • Target

      3e718df1bca021ecfccdcb6464dfc2ba08323af4fca7d9cc6d330b8a5ed132bd

    • Size

      570KB

    • MD5

      97c0e0d08214675b63562dad5ba1e123

    • SHA1

      08f935c66ecd751197bbd73f0d39bfbcbe8736d2

    • SHA256

      3e718df1bca021ecfccdcb6464dfc2ba08323af4fca7d9cc6d330b8a5ed132bd

    • SHA512

      98d672f89ea0c8769a5307c8d56dff7381b1496a3b49cd7aea91d96b89c72e4b1c21a732caf0a7bae45758fe4faf24faa5583ad594cfd2b146fa932172888daa

    • SSDEEP

      12288:4Mrxy90Pahimz7AuxqV2KnxfUEQBOMel19QdS2QPeY3:5ySsVAuxYfnq7UMgsdSzPv

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks