General

  • Target

    012246d33d0db647d7d358792ca9610d561f0cfdbb7b173966842d93ad4af725.bin

  • Size

    652KB

  • Sample

    230311-26ecnabh26

  • MD5

    14f5e165626c6af52bffbc89d21329cc

  • SHA1

    984311acb1194d14570e18fb067d0d77e18e09f7

  • SHA256

    012246d33d0db647d7d358792ca9610d561f0cfdbb7b173966842d93ad4af725

  • SHA512

    09943f10e8f01e32822a270451c7a6b9d46657b1b7d857f70c7a39ec0f11b49d79faefd8bb6cdfd3dc16b3fa4d224e793a9fa77c15048d025129fac470737fba

  • SSDEEP

    12288:zVWaqBVJ9djGK+NILVhWtA2upeUQFEoo+eN1d2xH8+llKGkAOH:zVWlhd+NIph4APeUQFEoo+eN1OH8+llu

Malware Config

Extracted

Family

redline

Botnet

garry

C2

193.56.146.11:4173

Attributes
  • auth_value

    210ba56bf751fefe327f26e00f0be5a9

Targets

    • Target

      012246d33d0db647d7d358792ca9610d561f0cfdbb7b173966842d93ad4af725.bin

    • Size

      652KB

    • MD5

      14f5e165626c6af52bffbc89d21329cc

    • SHA1

      984311acb1194d14570e18fb067d0d77e18e09f7

    • SHA256

      012246d33d0db647d7d358792ca9610d561f0cfdbb7b173966842d93ad4af725

    • SHA512

      09943f10e8f01e32822a270451c7a6b9d46657b1b7d857f70c7a39ec0f11b49d79faefd8bb6cdfd3dc16b3fa4d224e793a9fa77c15048d025129fac470737fba

    • SSDEEP

      12288:zVWaqBVJ9djGK+NILVhWtA2upeUQFEoo+eN1d2xH8+llKGkAOH:zVWlhd+NIph4APeUQFEoo+eN1OH8+llu

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks