General

  • Target

    03eac5f268888368a3e20f41ce36f1eb17647646ea0c79080a0be9023911383a

  • Size

    696KB

  • Sample

    230328-nqkmvacd4y

  • MD5

    dd9b35d755f5802dc0478d284cd2a91b

  • SHA1

    5fa02181e26973c91f853a5ef17d0d5c9b70e0c0

  • SHA256

    03eac5f268888368a3e20f41ce36f1eb17647646ea0c79080a0be9023911383a

  • SHA512

    1aadb0e0e3d8ac0d9d3f62509792d9ab69cc5f4b2f53087a9449cd0a5512a8538767117de7d215328c5877e50de6d1e30238d5ddbb14edfcc6cc2be14b202b92

  • SSDEEP

    12288:WMrVy90S7tU76YqZZhrp/Y/x8Pbq77JvwCJXL6kWGjJAxI9gcy5nci:ryFto6YqZHExMO3mCpYGjCI9Rti

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      03eac5f268888368a3e20f41ce36f1eb17647646ea0c79080a0be9023911383a

    • Size

      696KB

    • MD5

      dd9b35d755f5802dc0478d284cd2a91b

    • SHA1

      5fa02181e26973c91f853a5ef17d0d5c9b70e0c0

    • SHA256

      03eac5f268888368a3e20f41ce36f1eb17647646ea0c79080a0be9023911383a

    • SHA512

      1aadb0e0e3d8ac0d9d3f62509792d9ab69cc5f4b2f53087a9449cd0a5512a8538767117de7d215328c5877e50de6d1e30238d5ddbb14edfcc6cc2be14b202b92

    • SSDEEP

      12288:WMrVy90S7tU76YqZZhrp/Y/x8Pbq77JvwCJXL6kWGjJAxI9gcy5nci:ryFto6YqZHExMO3mCpYGjCI9Rti

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks