General

  • Target

    edaa13dbdaf41327326d6b526a64de604cd8edcedb48f603f187183262fb696c

  • Size

    581KB

  • Sample

    230605-fg66gseh58

  • MD5

    d5e2746fc86a02663c69b2e6cb402d79

  • SHA1

    d7a146dc64e73e74db2e4db708114d2df9ce501a

  • SHA256

    edaa13dbdaf41327326d6b526a64de604cd8edcedb48f603f187183262fb696c

  • SHA512

    0dcf079e092da79e95ccd302aac85296aeb2df6570562d1a4aab955567bb0474373b3f374d9a3c0f1b949f52a45da8096c508bb167a4ee6d476897d3e8085a61

  • SSDEEP

    12288:AMrzy90lt5TfPnggWJ+e6VayquifqnG71m5dhP7hzf26Xz:DyM9Xg3E4FMP7hzf7

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      edaa13dbdaf41327326d6b526a64de604cd8edcedb48f603f187183262fb696c

    • Size

      581KB

    • MD5

      d5e2746fc86a02663c69b2e6cb402d79

    • SHA1

      d7a146dc64e73e74db2e4db708114d2df9ce501a

    • SHA256

      edaa13dbdaf41327326d6b526a64de604cd8edcedb48f603f187183262fb696c

    • SHA512

      0dcf079e092da79e95ccd302aac85296aeb2df6570562d1a4aab955567bb0474373b3f374d9a3c0f1b949f52a45da8096c508bb167a4ee6d476897d3e8085a61

    • SSDEEP

      12288:AMrzy90lt5TfPnggWJ+e6VayquifqnG71m5dhP7hzf26Xz:DyM9Xg3E4FMP7hzf7

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks