General

  • Target

    45b26e56b5da762c4ccdf36524d93f02d07b95192439a739e5e21509eede124f

  • Size

    1.0MB

  • Sample

    230327-trljesgc9t

  • MD5

    4542adfd01621aa38c28e1ade5524fd3

  • SHA1

    5ace280e419588fd94c66a7a1e8967379f14a576

  • SHA256

    45b26e56b5da762c4ccdf36524d93f02d07b95192439a739e5e21509eede124f

  • SHA512

    981820ab772137ef3347626ade6c03ca349d0ee6573452ded0dc9f3897c950c6c7db122463b51b452c75e48be525662d4bbb4ca6e48971bb68a2c5d5dc510eae

  • SSDEEP

    24576:aybX82FLEKvKY1e2i8vIuyd1k2CzlR/7Za1Pg:hz8mLEmKY1e2iGIFd1k2CpR/7Z

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Targets

    • Target

      45b26e56b5da762c4ccdf36524d93f02d07b95192439a739e5e21509eede124f

    • Size

      1.0MB

    • MD5

      4542adfd01621aa38c28e1ade5524fd3

    • SHA1

      5ace280e419588fd94c66a7a1e8967379f14a576

    • SHA256

      45b26e56b5da762c4ccdf36524d93f02d07b95192439a739e5e21509eede124f

    • SHA512

      981820ab772137ef3347626ade6c03ca349d0ee6573452ded0dc9f3897c950c6c7db122463b51b452c75e48be525662d4bbb4ca6e48971bb68a2c5d5dc510eae

    • SSDEEP

      24576:aybX82FLEKvKY1e2i8vIuyd1k2CzlR/7Za1Pg:hz8mLEmKY1e2iGIFd1k2CpR/7Z

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks