General

  • Target

    2c1e58eb9a44977fb1a39d535c45632e9abe9b1903bf17e15865794817b009f1

  • Size

    680KB

  • Sample

    230324-nq2lcsgb2z

  • MD5

    619389d1676c8ca1434e5079ed9aba5d

  • SHA1

    94675f9bf5bb0263c605e077069d685ce8c39079

  • SHA256

    2c1e58eb9a44977fb1a39d535c45632e9abe9b1903bf17e15865794817b009f1

  • SHA512

    3ddf0db8e8d5fc3d58d1c2197cf2c2cdf3b19f931f3a88159b6e966aedba0c0aa371d063cc201b6a15164e574a3879902f2992ca8ce3d367e6cb3a00f1923416

  • SSDEEP

    12288:VmMzFXFWH+sb7gsOV4Fcie32MPCXBCL2y/EArnF7mUeqlBCKVO2Ri:J2HD26KieG1Xs/E6F7mJqlBCKHI

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Targets

    • Target

      2c1e58eb9a44977fb1a39d535c45632e9abe9b1903bf17e15865794817b009f1

    • Size

      680KB

    • MD5

      619389d1676c8ca1434e5079ed9aba5d

    • SHA1

      94675f9bf5bb0263c605e077069d685ce8c39079

    • SHA256

      2c1e58eb9a44977fb1a39d535c45632e9abe9b1903bf17e15865794817b009f1

    • SHA512

      3ddf0db8e8d5fc3d58d1c2197cf2c2cdf3b19f931f3a88159b6e966aedba0c0aa371d063cc201b6a15164e574a3879902f2992ca8ce3d367e6cb3a00f1923416

    • SSDEEP

      12288:VmMzFXFWH+sb7gsOV4Fcie32MPCXBCL2y/EArnF7mUeqlBCKVO2Ri:J2HD26KieG1Xs/E6F7mJqlBCKHI

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks