General

  • Target

    7398fba9c05738e6830443a55be15e290091d590136bd5b001989a5446f9f796

  • Size

    700KB

  • Sample

    230327-trp7lsgc9v

  • MD5

    6bd3474d74cc15ee8439c043a4dccc31

  • SHA1

    c4a2fa40275d7a83b8c2bfed9917bf30af0a70e3

  • SHA256

    7398fba9c05738e6830443a55be15e290091d590136bd5b001989a5446f9f796

  • SHA512

    76f74d03e742005c64e05b293940b3a2227bf61228705f83d571e7ac134065548b3bc08c42ebf4d7e18d703e3f316538fdd20bd5c9d7f09eed7d58dfa0ef562b

  • SSDEEP

    12288:0Mrdy90KeJk7S6W6MHoCjpPA/qR6kIxMOymPbcbPBRvW4h5B67:Zy2JYW6I5pPCXk0y6sPKu5B67

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Targets

    • Target

      7398fba9c05738e6830443a55be15e290091d590136bd5b001989a5446f9f796

    • Size

      700KB

    • MD5

      6bd3474d74cc15ee8439c043a4dccc31

    • SHA1

      c4a2fa40275d7a83b8c2bfed9917bf30af0a70e3

    • SHA256

      7398fba9c05738e6830443a55be15e290091d590136bd5b001989a5446f9f796

    • SHA512

      76f74d03e742005c64e05b293940b3a2227bf61228705f83d571e7ac134065548b3bc08c42ebf4d7e18d703e3f316538fdd20bd5c9d7f09eed7d58dfa0ef562b

    • SSDEEP

      12288:0Mrdy90KeJk7S6W6MHoCjpPA/qR6kIxMOymPbcbPBRvW4h5B67:Zy2JYW6I5pPCXk0y6sPKu5B67

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks