General

  • Target

    cb6a51b3cd2bb6faff938a73d11394312a29439899e08823444762137b82b339

  • Size

    700KB

  • Sample

    230327-ttehwsgc9z

  • MD5

    a71b3f40e6af3642ae2095897248e533

  • SHA1

    940b6a420eabe26341dbc0fbae075b55f6880f30

  • SHA256

    cb6a51b3cd2bb6faff938a73d11394312a29439899e08823444762137b82b339

  • SHA512

    73b1030aed8e57598b95df8ba4a7b6e34e36160525a1fc09cd23ece1ac4b96bde895b012aad27ebb8020c9536f89ae126b2bd7e26dc7017d70dcaa92b4ebadb7

  • SSDEEP

    12288:nMr3y90X4OM+7csJOd2/8h+/uAzq8bjxuAtoicuBRvtzUuV59pAYIYbnC:UygIiOd2Mz23jZuRuhv5MYw

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Targets

    • Target

      cb6a51b3cd2bb6faff938a73d11394312a29439899e08823444762137b82b339

    • Size

      700KB

    • MD5

      a71b3f40e6af3642ae2095897248e533

    • SHA1

      940b6a420eabe26341dbc0fbae075b55f6880f30

    • SHA256

      cb6a51b3cd2bb6faff938a73d11394312a29439899e08823444762137b82b339

    • SHA512

      73b1030aed8e57598b95df8ba4a7b6e34e36160525a1fc09cd23ece1ac4b96bde895b012aad27ebb8020c9536f89ae126b2bd7e26dc7017d70dcaa92b4ebadb7

    • SSDEEP

      12288:nMr3y90X4OM+7csJOd2/8h+/uAzq8bjxuAtoicuBRvtzUuV59pAYIYbnC:UygIiOd2Mz23jZuRuhv5MYw

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks