General

  • Target

    46bfe886ea2c9c0e7ffd450bf542b971eaae59e1aa417ded2d5d1347a445dd98

  • Size

    581KB

  • Sample

    230605-dfeczaef54

  • MD5

    1253121fd4f3de775178f2d56f2a6f78

  • SHA1

    8abb80df6a2eb3bc5eb9fb0a68cb155aebe9ad9a

  • SHA256

    46bfe886ea2c9c0e7ffd450bf542b971eaae59e1aa417ded2d5d1347a445dd98

  • SHA512

    5960278d065faa9bf1c21d48ed3c5418828811d85142487ad0178387c79d7e5dc577edb48da31737769146ffb0fd0708be0e8771b4a437cd3a24c14b1d410d2a

  • SSDEEP

    12288:1Mr7y904FrRbN3jBun9OE43Z6xgPd40JELr6p6/:Gy1F33dunnWnUOp6/

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      46bfe886ea2c9c0e7ffd450bf542b971eaae59e1aa417ded2d5d1347a445dd98

    • Size

      581KB

    • MD5

      1253121fd4f3de775178f2d56f2a6f78

    • SHA1

      8abb80df6a2eb3bc5eb9fb0a68cb155aebe9ad9a

    • SHA256

      46bfe886ea2c9c0e7ffd450bf542b971eaae59e1aa417ded2d5d1347a445dd98

    • SHA512

      5960278d065faa9bf1c21d48ed3c5418828811d85142487ad0178387c79d7e5dc577edb48da31737769146ffb0fd0708be0e8771b4a437cd3a24c14b1d410d2a

    • SSDEEP

      12288:1Mr7y904FrRbN3jBun9OE43Z6xgPd40JELr6p6/:Gy1F33dunnWnUOp6/

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks