General

  • Target

    1fba8f29ec06e397f1c444b4b8a871be1794b06ca8d93939a85b8b82b5fb452d

  • Size

    580KB

  • Sample

    230605-gklvdsfa66

  • MD5

    19c711525b964c991eaf9fe8eed69a12

  • SHA1

    d7bc63204ad4cc573e0a5ca3c73019dcb487e271

  • SHA256

    1fba8f29ec06e397f1c444b4b8a871be1794b06ca8d93939a85b8b82b5fb452d

  • SHA512

    03517ec1afe0625c1509711f455982cf426def548b01880642d0d1b3cc44c128dd4f2c4030241a41531397e5a4a8fdcd70a6a0db63424a8a6e5afc2da1191a46

  • SSDEEP

    12288:kMrny90xiMvqGV54haox/6quvWq1g5o/ya0ClA:7y2lPqnoWSx/A

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      1fba8f29ec06e397f1c444b4b8a871be1794b06ca8d93939a85b8b82b5fb452d

    • Size

      580KB

    • MD5

      19c711525b964c991eaf9fe8eed69a12

    • SHA1

      d7bc63204ad4cc573e0a5ca3c73019dcb487e271

    • SHA256

      1fba8f29ec06e397f1c444b4b8a871be1794b06ca8d93939a85b8b82b5fb452d

    • SHA512

      03517ec1afe0625c1509711f455982cf426def548b01880642d0d1b3cc44c128dd4f2c4030241a41531397e5a4a8fdcd70a6a0db63424a8a6e5afc2da1191a46

    • SSDEEP

      12288:kMrny90xiMvqGV54haox/6quvWq1g5o/ya0ClA:7y2lPqnoWSx/A

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks