General

  • Target

    f4ff24559639f9623794d7032107a9c16126c7d7e8d9c10ede7b25921a775baa

  • Size

    696KB

  • Sample

    230327-vtq3csge3z

  • MD5

    e6e9d84b94a80fb70de664bbb1e760fa

  • SHA1

    6196990577a1d127942f7d19ffce51340576f8fa

  • SHA256

    f4ff24559639f9623794d7032107a9c16126c7d7e8d9c10ede7b25921a775baa

  • SHA512

    b4bfa2290b04b08942ca58fedc8a759715d3a5266b5a0d5cc64f644905fbe3a58426eebcf81d52aa8b96e011cd81d38afc903166b096e652c717848b0c30c0a6

  • SSDEEP

    12288:GldKvPdNzHuqabPOfG4XRZm/3wjgbhgIRPIKBC3eVe8w:KAt9HuXPYhc/g6hgIZRaeVe8

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Targets

    • Target

      f4ff24559639f9623794d7032107a9c16126c7d7e8d9c10ede7b25921a775baa

    • Size

      696KB

    • MD5

      e6e9d84b94a80fb70de664bbb1e760fa

    • SHA1

      6196990577a1d127942f7d19ffce51340576f8fa

    • SHA256

      f4ff24559639f9623794d7032107a9c16126c7d7e8d9c10ede7b25921a775baa

    • SHA512

      b4bfa2290b04b08942ca58fedc8a759715d3a5266b5a0d5cc64f644905fbe3a58426eebcf81d52aa8b96e011cd81d38afc903166b096e652c717848b0c30c0a6

    • SSDEEP

      12288:GldKvPdNzHuqabPOfG4XRZm/3wjgbhgIRPIKBC3eVe8w:KAt9HuXPYhc/g6hgIZRaeVe8

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks