General

  • Target

    2788548f8966354dfd4fd4d3f0fb01ee2d424586823a2bb6cc153453bc873995

  • Size

    700KB

  • Sample

    230327-t6ttcagd4y

  • MD5

    7afcc543ad932d8c7935c16c7b37e446

  • SHA1

    ed8679160a7560bf664df51f878d08e3667792db

  • SHA256

    2788548f8966354dfd4fd4d3f0fb01ee2d424586823a2bb6cc153453bc873995

  • SHA512

    3fbd0e699f9ebd6dcfd05427d23e0a461ab852ada54205bc7fc234a84100ad580f1f958621f74cc15ec893f822b7ac5a870eecc375b777a229d4776b19d743fc

  • SSDEEP

    12288:4Mr/y90d9fhF1F4UcVwzfwMZaKiA4Flu/bFZ0ymJ7NTBRvnivlHydu8Cr:XyYh3FPcwbXZa64FE/buT2SdCr

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Targets

    • Target

      2788548f8966354dfd4fd4d3f0fb01ee2d424586823a2bb6cc153453bc873995

    • Size

      700KB

    • MD5

      7afcc543ad932d8c7935c16c7b37e446

    • SHA1

      ed8679160a7560bf664df51f878d08e3667792db

    • SHA256

      2788548f8966354dfd4fd4d3f0fb01ee2d424586823a2bb6cc153453bc873995

    • SHA512

      3fbd0e699f9ebd6dcfd05427d23e0a461ab852ada54205bc7fc234a84100ad580f1f958621f74cc15ec893f822b7ac5a870eecc375b777a229d4776b19d743fc

    • SSDEEP

      12288:4Mr/y90d9fhF1F4UcVwzfwMZaKiA4Flu/bFZ0ymJ7NTBRvnivlHydu8Cr:XyYh3FPcwbXZa64FE/buT2SdCr

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks