General

  • Target

    68d9ca9b008c38b43dcd6ef6efb65bc873c0f9059c8751bd1e37e7578e79740a

  • Size

    581KB

  • Sample

    230605-fj2c1seh63

  • MD5

    9e03656968ab066f370c0b2f61f63918

  • SHA1

    e909cdbacfc9afecc0952033e04fc437d29c83bb

  • SHA256

    68d9ca9b008c38b43dcd6ef6efb65bc873c0f9059c8751bd1e37e7578e79740a

  • SHA512

    b097c69429a4358ee4cb6de53c738ae0ef72b1e8959fbae2a108493d4aa4794e6ad25b75cbc7fb89e7378082360051fb07be9a2f264cb56f6d4cae0315e03a99

  • SSDEEP

    12288:HMryy90vJpvHjqfRpr+QCIcqIWHO4AR/2AfoAW3GvDg:ZymJpbqbyiIv3R/2Akog

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      68d9ca9b008c38b43dcd6ef6efb65bc873c0f9059c8751bd1e37e7578e79740a

    • Size

      581KB

    • MD5

      9e03656968ab066f370c0b2f61f63918

    • SHA1

      e909cdbacfc9afecc0952033e04fc437d29c83bb

    • SHA256

      68d9ca9b008c38b43dcd6ef6efb65bc873c0f9059c8751bd1e37e7578e79740a

    • SHA512

      b097c69429a4358ee4cb6de53c738ae0ef72b1e8959fbae2a108493d4aa4794e6ad25b75cbc7fb89e7378082360051fb07be9a2f264cb56f6d4cae0315e03a99

    • SSDEEP

      12288:HMryy90vJpvHjqfRpr+QCIcqIWHO4AR/2AfoAW3GvDg:ZymJpbqbyiIv3R/2Akog

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks