General

  • Target

    555bf10092df0368b987fad59b226104ad225a5bd5ae95d60ee7bb92662c2a17

  • Size

    700KB

  • Sample

    230327-t1er8sec68

  • MD5

    96517a53b37d9729480eee29fd3c249c

  • SHA1

    41841b3041ecdb69cc670c95ce23c2fb74cc6d3f

  • SHA256

    555bf10092df0368b987fad59b226104ad225a5bd5ae95d60ee7bb92662c2a17

  • SHA512

    43fc99ffdb5991ead7ad3fabaff09a799b6a34029dfc814720c37bf1f346ab230384f967995b21fb871128251470b39a1a23f7dfc6e311869fdfc5a8a9f9ea62

  • SSDEEP

    12288:LMrly90tx27GbrwPP64WtA8q6qlqufFdJvsxcIuBRvn0QYKFFvC:+y77swK4uJ5OnJUDuTF8

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Targets

    • Target

      555bf10092df0368b987fad59b226104ad225a5bd5ae95d60ee7bb92662c2a17

    • Size

      700KB

    • MD5

      96517a53b37d9729480eee29fd3c249c

    • SHA1

      41841b3041ecdb69cc670c95ce23c2fb74cc6d3f

    • SHA256

      555bf10092df0368b987fad59b226104ad225a5bd5ae95d60ee7bb92662c2a17

    • SHA512

      43fc99ffdb5991ead7ad3fabaff09a799b6a34029dfc814720c37bf1f346ab230384f967995b21fb871128251470b39a1a23f7dfc6e311869fdfc5a8a9f9ea62

    • SSDEEP

      12288:LMrly90tx27GbrwPP64WtA8q6qlqufFdJvsxcIuBRvn0QYKFFvC:+y77swK4uJ5OnJUDuTF8

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks