General

  • Target

    2f574d2eea034e896b38aa19ea7192a162c353cc7c31c30e8e3ca5a1180ee68e

  • Size

    581KB

  • Sample

    230605-f3lfxaeh97

  • MD5

    fd5490265aba587f9be6ab85373f2502

  • SHA1

    90e19b4452bb49c0ab21fcffdb53c5f9ea3c02d6

  • SHA256

    2f574d2eea034e896b38aa19ea7192a162c353cc7c31c30e8e3ca5a1180ee68e

  • SHA512

    4a39e5c322bdda69def8ba96d5024060c78f722e0d89ab279ba477b5f27b6faccadc7a19695ec5a3b0d22807afbb33fc9aa5f77794b8510da54288705d65caee

  • SSDEEP

    12288:5MrXy90Qy0CBt4CgYkTq044wNn27rkxmfnhgP6OXXLw:myBy0o4wakxPP6O8

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      2f574d2eea034e896b38aa19ea7192a162c353cc7c31c30e8e3ca5a1180ee68e

    • Size

      581KB

    • MD5

      fd5490265aba587f9be6ab85373f2502

    • SHA1

      90e19b4452bb49c0ab21fcffdb53c5f9ea3c02d6

    • SHA256

      2f574d2eea034e896b38aa19ea7192a162c353cc7c31c30e8e3ca5a1180ee68e

    • SHA512

      4a39e5c322bdda69def8ba96d5024060c78f722e0d89ab279ba477b5f27b6faccadc7a19695ec5a3b0d22807afbb33fc9aa5f77794b8510da54288705d65caee

    • SSDEEP

      12288:5MrXy90Qy0CBt4CgYkTq044wNn27rkxmfnhgP6OXXLw:myBy0o4wakxPP6O8

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks