General

  • Target

    007409d66736180d4d531ff315dc86ed83ba2605252ee9ea65a23dc6d4d35e3d.bin

  • Size

    724KB

  • Sample

    230311-251t9sbg72

  • MD5

    c470dca772a20d21c508f560bc1a9ddd

  • SHA1

    252b2bed1f69470408ecfcc85bcaaeafe19eddb6

  • SHA256

    007409d66736180d4d531ff315dc86ed83ba2605252ee9ea65a23dc6d4d35e3d

  • SHA512

    ca19e60532dfcada507c2b10e22ac75bf22bc1f360e9d08448ab2f1f8dbfc1918f2414b678e5120e84d1c7864e4ea75e24a5d851f89f40c2df00f17f0fd1613e

  • SSDEEP

    12288:8MrOy90yqh0d/FeD3YaaIHMzwZE5RbmbuyvVJTKiYXSQa3EKX:qy2h8NejYDwZE5Rb0uQ4iYClES

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Targets

    • Target

      007409d66736180d4d531ff315dc86ed83ba2605252ee9ea65a23dc6d4d35e3d.bin

    • Size

      724KB

    • MD5

      c470dca772a20d21c508f560bc1a9ddd

    • SHA1

      252b2bed1f69470408ecfcc85bcaaeafe19eddb6

    • SHA256

      007409d66736180d4d531ff315dc86ed83ba2605252ee9ea65a23dc6d4d35e3d

    • SHA512

      ca19e60532dfcada507c2b10e22ac75bf22bc1f360e9d08448ab2f1f8dbfc1918f2414b678e5120e84d1c7864e4ea75e24a5d851f89f40c2df00f17f0fd1613e

    • SSDEEP

      12288:8MrOy90yqh0d/FeD3YaaIHMzwZE5RbmbuyvVJTKiYXSQa3EKX:qy2h8NejYDwZE5Rb0uQ4iYClES

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks