General

  • Target

    f0ee9881e5d7e2d8ec5dac75dbef0ca6c901b97fdf0e5f8147a7416e990df413

  • Size

    580KB

  • Sample

    230605-fsg1qseh74

  • MD5

    7a95d8176babc8d4001f66751970388e

  • SHA1

    310ef01c2818c268356aba406e4734a37fb1de74

  • SHA256

    f0ee9881e5d7e2d8ec5dac75dbef0ca6c901b97fdf0e5f8147a7416e990df413

  • SHA512

    90e2f77f59452a32e1df44404e46b06c183d0032ca73adb72a260b68fc81ed3ee944b9b69bea93cb2e5575bb5ed29bf6dde35fe9f10992bd56ae0c6b25f16906

  • SSDEEP

    6144:K3y+bnr+lp0yN90QElvZZ8PvdYJXuyLxyfD+zT7qk6S5z3zfd5IQqLVDTdfJAZs+:pMrpy90km9u6yb+X7/WVD/3EVQfMwa

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      f0ee9881e5d7e2d8ec5dac75dbef0ca6c901b97fdf0e5f8147a7416e990df413

    • Size

      580KB

    • MD5

      7a95d8176babc8d4001f66751970388e

    • SHA1

      310ef01c2818c268356aba406e4734a37fb1de74

    • SHA256

      f0ee9881e5d7e2d8ec5dac75dbef0ca6c901b97fdf0e5f8147a7416e990df413

    • SHA512

      90e2f77f59452a32e1df44404e46b06c183d0032ca73adb72a260b68fc81ed3ee944b9b69bea93cb2e5575bb5ed29bf6dde35fe9f10992bd56ae0c6b25f16906

    • SSDEEP

      6144:K3y+bnr+lp0yN90QElvZZ8PvdYJXuyLxyfD+zT7qk6S5z3zfd5IQqLVDTdfJAZs+:pMrpy90km9u6yb+X7/WVD/3EVQfMwa

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks