General

  • Target

    ee4394af07d647d16c02e540c126b715707e0a1b0ac6e8004e0c7c490e44ef66

  • Size

    1.2MB

  • Sample

    230318-mpvkzsbh96

  • MD5

    855404ce8ddf9c3cd2d965530f0f3e07

  • SHA1

    fc4f4490d69fca3e7e15c6ddff742d94347cde9c

  • SHA256

    ee4394af07d647d16c02e540c126b715707e0a1b0ac6e8004e0c7c490e44ef66

  • SHA512

    31222ace422bce16973e717b5aae1079cf68ce1d439ad222cb5c12647a792f668eba39ddeaeb80a9acf0e53c6e12f12d854b02358d26d5841ec5791ffe0a49d4

  • SSDEEP

    24576:bLqRgL+yBbTGv9bti2okQsRVs+CkD8r49sIH:b2RoOF42okQswM

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Targets

    • Target

      ee4394af07d647d16c02e540c126b715707e0a1b0ac6e8004e0c7c490e44ef66

    • Size

      1.2MB

    • MD5

      855404ce8ddf9c3cd2d965530f0f3e07

    • SHA1

      fc4f4490d69fca3e7e15c6ddff742d94347cde9c

    • SHA256

      ee4394af07d647d16c02e540c126b715707e0a1b0ac6e8004e0c7c490e44ef66

    • SHA512

      31222ace422bce16973e717b5aae1079cf68ce1d439ad222cb5c12647a792f668eba39ddeaeb80a9acf0e53c6e12f12d854b02358d26d5841ec5791ffe0a49d4

    • SSDEEP

      24576:bLqRgL+yBbTGv9bti2okQsRVs+CkD8r49sIH:b2RoOF42okQswM

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks