General

  • Target

    76fa99d3add665ac9703b79e52f4eef1676beb6b84582d963749e33971d46dba

  • Size

    581KB

  • Sample

    230605-c4hvmafb4x

  • MD5

    18a578c6eb0f2f795efa9e2670c50aa8

  • SHA1

    f607a2b1f454caebb4b0b9a1f5205d1e10aff2f8

  • SHA256

    76fa99d3add665ac9703b79e52f4eef1676beb6b84582d963749e33971d46dba

  • SHA512

    839d2d694e4a8934635a970c969cafa284d414b648ebc5beab0e34470582b446569b8b927fc125b09c4b8f9f7acd0077e606a0394dcb3a276bc60ae31bf70488

  • SSDEEP

    12288:MMrTy90+EY7nZjEQ0JmrLoZANkXZqKiYreRPN42EB8Zp5bvw+:HytHZjEHJmr0ZANhKiASN4invn

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      76fa99d3add665ac9703b79e52f4eef1676beb6b84582d963749e33971d46dba

    • Size

      581KB

    • MD5

      18a578c6eb0f2f795efa9e2670c50aa8

    • SHA1

      f607a2b1f454caebb4b0b9a1f5205d1e10aff2f8

    • SHA256

      76fa99d3add665ac9703b79e52f4eef1676beb6b84582d963749e33971d46dba

    • SHA512

      839d2d694e4a8934635a970c969cafa284d414b648ebc5beab0e34470582b446569b8b927fc125b09c4b8f9f7acd0077e606a0394dcb3a276bc60ae31bf70488

    • SSDEEP

      12288:MMrTy90+EY7nZjEQ0JmrLoZANkXZqKiYreRPN42EB8Zp5bvw+:HytHZjEHJmr0ZANhKiASN4invn

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks