General

  • Target

    0dbe073c6ae4a80af04922a048094daeabfbb5d634908aaabb99e34e0972261d

  • Size

    700KB

  • Sample

    230327-vc2grsgd7t

  • MD5

    4f4fa1b1e67b102bd08a7461b8b7d663

  • SHA1

    c884129e2fdb124615c5305a008cf14fbbca86a4

  • SHA256

    0dbe073c6ae4a80af04922a048094daeabfbb5d634908aaabb99e34e0972261d

  • SHA512

    5e873f7ced8a60af623082bb5c08747adaeb47812a5cb289a01b601d3133436c64c73e8d0b96b79d0035d45108651ca350ab179f79faa92e87424b16d4c2daf1

  • SSDEEP

    12288:eMr6y90FD9Wk9q7BS9LJ0+pHVKHqGVHV2cu4dhrxwP4BRvwJ55TycsZV68wegOw:MyKeGGu4KGLjxwP4cJ5tjs/6V

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Targets

    • Target

      0dbe073c6ae4a80af04922a048094daeabfbb5d634908aaabb99e34e0972261d

    • Size

      700KB

    • MD5

      4f4fa1b1e67b102bd08a7461b8b7d663

    • SHA1

      c884129e2fdb124615c5305a008cf14fbbca86a4

    • SHA256

      0dbe073c6ae4a80af04922a048094daeabfbb5d634908aaabb99e34e0972261d

    • SHA512

      5e873f7ced8a60af623082bb5c08747adaeb47812a5cb289a01b601d3133436c64c73e8d0b96b79d0035d45108651ca350ab179f79faa92e87424b16d4c2daf1

    • SSDEEP

      12288:eMr6y90FD9Wk9q7BS9LJ0+pHVKHqGVHV2cu4dhrxwP4BRvwJ55TycsZV68wegOw:MyKeGGu4KGLjxwP4cJ5tjs/6V

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks