General

  • Target

    dfb36492cbed8accfd567723420fee4e8c9cdf55de5fa5c32dafb32612cadd01

  • Size

    700KB

  • Sample

    230327-tz19vaec66

  • MD5

    8543c0aac5a524ea3bf50e9c79f139e6

  • SHA1

    e6f0401d292fa024230932005ca81ed671e2312d

  • SHA256

    dfb36492cbed8accfd567723420fee4e8c9cdf55de5fa5c32dafb32612cadd01

  • SHA512

    8cbf903872817763397789f0360a35b4cdbe00b3f7c751d357380cebb0676a85e256bcdea374436ca5d0f6d7a3bec93dc250903a911bbca6945598759149e411

  • SSDEEP

    12288:+Mr7y90VUqRCdtyzwft90RJWAA9qWjSF7FhKx5iQ3QyFcewYBRvLQ6GS6x:tyAUqRDzwVaXkXSBiLi6QHYXRux

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Targets

    • Target

      dfb36492cbed8accfd567723420fee4e8c9cdf55de5fa5c32dafb32612cadd01

    • Size

      700KB

    • MD5

      8543c0aac5a524ea3bf50e9c79f139e6

    • SHA1

      e6f0401d292fa024230932005ca81ed671e2312d

    • SHA256

      dfb36492cbed8accfd567723420fee4e8c9cdf55de5fa5c32dafb32612cadd01

    • SHA512

      8cbf903872817763397789f0360a35b4cdbe00b3f7c751d357380cebb0676a85e256bcdea374436ca5d0f6d7a3bec93dc250903a911bbca6945598759149e411

    • SSDEEP

      12288:+Mr7y90VUqRCdtyzwft90RJWAA9qWjSF7FhKx5iQ3QyFcewYBRvLQ6GS6x:tyAUqRDzwVaXkXSBiLi6QHYXRux

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks