General

  • Target

    89b53ab3b343a12be4bae3d3a18c0e127d4101e17c2db33bb0589f5b40fdb505

  • Size

    700KB

  • Sample

    230327-tt9zssgc91

  • MD5

    716ecc15625bf929a3ecc59a7b826abe

  • SHA1

    14f3339c24d3f2ea0f1eca9088a4439b5ab96135

  • SHA256

    89b53ab3b343a12be4bae3d3a18c0e127d4101e17c2db33bb0589f5b40fdb505

  • SHA512

    973deadcbc4f2ff601166450e601cc627a69cac90699cf19211dee16d9972b242de0eb842b2f8174956eaed6069a814801fd99b7963e9356f4433349385498ad

  • SSDEEP

    12288:iMrNy90m7pGlqZKaV6TopAdAQqpBqu9cD/5gHzBRvsVgjGDbTJcok09:HyT7pLZNTp4dGgD/2Hz9jYm09

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Targets

    • Target

      89b53ab3b343a12be4bae3d3a18c0e127d4101e17c2db33bb0589f5b40fdb505

    • Size

      700KB

    • MD5

      716ecc15625bf929a3ecc59a7b826abe

    • SHA1

      14f3339c24d3f2ea0f1eca9088a4439b5ab96135

    • SHA256

      89b53ab3b343a12be4bae3d3a18c0e127d4101e17c2db33bb0589f5b40fdb505

    • SHA512

      973deadcbc4f2ff601166450e601cc627a69cac90699cf19211dee16d9972b242de0eb842b2f8174956eaed6069a814801fd99b7963e9356f4433349385498ad

    • SSDEEP

      12288:iMrNy90m7pGlqZKaV6TopAdAQqpBqu9cD/5gHzBRvsVgjGDbTJcok09:HyT7pLZNTp4dGgD/2Hz9jYm09

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks