General

  • Target

    601e2537f321ce891dfc3cbe45ce6c96d0d7208a5bd6f96e8f02be748feb203d

  • Size

    580KB

  • Sample

    230605-epmw5seg63

  • MD5

    199e955416728e56ec9cb5de1a9c021e

  • SHA1

    c5704cac5d66b79fee22be3c1d6955274612e7b8

  • SHA256

    601e2537f321ce891dfc3cbe45ce6c96d0d7208a5bd6f96e8f02be748feb203d

  • SHA512

    c7b23f07caf20b8227291752dd7562dcdc88c3c6f9d39432af1fa0bd3fb2afced407552a764f22f58a832a8510c4f89197e3f1f50cb4b1585681f7ac8ef2732d

  • SSDEEP

    12288:YMrJy90h0lWTSZkmNshyUHvfXllHmNwRXsb+t:hyPWTrUCfXEwOa

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      601e2537f321ce891dfc3cbe45ce6c96d0d7208a5bd6f96e8f02be748feb203d

    • Size

      580KB

    • MD5

      199e955416728e56ec9cb5de1a9c021e

    • SHA1

      c5704cac5d66b79fee22be3c1d6955274612e7b8

    • SHA256

      601e2537f321ce891dfc3cbe45ce6c96d0d7208a5bd6f96e8f02be748feb203d

    • SHA512

      c7b23f07caf20b8227291752dd7562dcdc88c3c6f9d39432af1fa0bd3fb2afced407552a764f22f58a832a8510c4f89197e3f1f50cb4b1585681f7ac8ef2732d

    • SSDEEP

      12288:YMrJy90h0lWTSZkmNshyUHvfXllHmNwRXsb+t:hyPWTrUCfXEwOa

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks