General

  • Target

    900268a8cac3f01f0f4b9186b2d2faa5471006a66caf8fded6ed8e523f89b5f4

  • Size

    489KB

  • Sample

    230507-kg7jgach9z

  • MD5

    ea302b468f52e8485cd187c51d23df46

  • SHA1

    38ca06bb11787e6c38a85dd49d26f9f7d108024e

  • SHA256

    900268a8cac3f01f0f4b9186b2d2faa5471006a66caf8fded6ed8e523f89b5f4

  • SHA512

    dca27ed47a664df113bd542a00873d13b5426ed9668e5dc794f473be42d5d6c40edb8ce4abef6a6036c02e215674b6663db6978559475cfa0afcc2e1baa6b95d

  • SSDEEP

    12288:lMrAy90MlpkbQZuTzkVY0IswI3NBnelQ5GVDVJ4R5:JyfeMZuUqdsNXesODVU

Malware Config

Extracted

Family

redline

Botnet

lada

C2

217.196.96.101:4132

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Targets

    • Target

      900268a8cac3f01f0f4b9186b2d2faa5471006a66caf8fded6ed8e523f89b5f4

    • Size

      489KB

    • MD5

      ea302b468f52e8485cd187c51d23df46

    • SHA1

      38ca06bb11787e6c38a85dd49d26f9f7d108024e

    • SHA256

      900268a8cac3f01f0f4b9186b2d2faa5471006a66caf8fded6ed8e523f89b5f4

    • SHA512

      dca27ed47a664df113bd542a00873d13b5426ed9668e5dc794f473be42d5d6c40edb8ce4abef6a6036c02e215674b6663db6978559475cfa0afcc2e1baa6b95d

    • SSDEEP

      12288:lMrAy90MlpkbQZuTzkVY0IswI3NBnelQ5GVDVJ4R5:JyfeMZuUqdsNXesODVU

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks