General

  • Target

    909757acd131a67d24b91ced5ecd760e1e6164106cca1d7bfe1e3a6c337fc092

  • Size

    580KB

  • Sample

    230605-gdgbbsfe7x

  • MD5

    083f63f0a1b0e8341c707c51b16a5897

  • SHA1

    2ef9c680caf38f546e627032dbe8535556202450

  • SHA256

    909757acd131a67d24b91ced5ecd760e1e6164106cca1d7bfe1e3a6c337fc092

  • SHA512

    848e9f300c9a39c1c510e817b5d80d57b038cbfc9d35ae698206c0e450d17a7e2becda446e7d73d28ab253c479a7134c4042176991dd8e0852871f46e609c8b2

  • SSDEEP

    12288:OMrwy90FUAAylSXbwIob+5T3jHbhNIw3m8M0+qw1Cm:+yjaSXqb+RzHl6wTM05m

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      909757acd131a67d24b91ced5ecd760e1e6164106cca1d7bfe1e3a6c337fc092

    • Size

      580KB

    • MD5

      083f63f0a1b0e8341c707c51b16a5897

    • SHA1

      2ef9c680caf38f546e627032dbe8535556202450

    • SHA256

      909757acd131a67d24b91ced5ecd760e1e6164106cca1d7bfe1e3a6c337fc092

    • SHA512

      848e9f300c9a39c1c510e817b5d80d57b038cbfc9d35ae698206c0e450d17a7e2becda446e7d73d28ab253c479a7134c4042176991dd8e0852871f46e609c8b2

    • SSDEEP

      12288:OMrwy90FUAAylSXbwIob+5T3jHbhNIw3m8M0+qw1Cm:+yjaSXqb+RzHl6wTM05m

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks