General

  • Target

    25f9fa0c0bda7ec46c931caa308cea1abf8220ef7bb46f7ec576a7a964ff36ad

  • Size

    580KB

  • Sample

    230605-ahak1sec37

  • MD5

    7732e10eb10bab5e9eda47ffabd909c3

  • SHA1

    da88680b8cea482d22f45eefb68a00e01fafc427

  • SHA256

    25f9fa0c0bda7ec46c931caa308cea1abf8220ef7bb46f7ec576a7a964ff36ad

  • SHA512

    51e2a6c2b30cabe5fc42097714be6040810c78b2aa96b0741532e546d05d9ceb8e96d36c1465585b83156493d2da38f0652a041dd115695fe0e6ddef06da6576

  • SSDEEP

    12288:1MrEy90+hPj0psBGhy4TsHSmITerPfT1dP0WNJ5Sw8yRmGps:Ryzh5BQySGSxebrfNJmyIG6

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      25f9fa0c0bda7ec46c931caa308cea1abf8220ef7bb46f7ec576a7a964ff36ad

    • Size

      580KB

    • MD5

      7732e10eb10bab5e9eda47ffabd909c3

    • SHA1

      da88680b8cea482d22f45eefb68a00e01fafc427

    • SHA256

      25f9fa0c0bda7ec46c931caa308cea1abf8220ef7bb46f7ec576a7a964ff36ad

    • SHA512

      51e2a6c2b30cabe5fc42097714be6040810c78b2aa96b0741532e546d05d9ceb8e96d36c1465585b83156493d2da38f0652a041dd115695fe0e6ddef06da6576

    • SSDEEP

      12288:1MrEy90+hPj0psBGhy4TsHSmITerPfT1dP0WNJ5Sw8yRmGps:Ryzh5BQySGSxebrfNJmyIG6

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks