General

  • Target

    17fbdc887305e01bd6fc3ca93dbb2b50af8d8bb8135bda4a8b244107b991767a

  • Size

    579KB

  • Sample

    230605-jqvqlafd78

  • MD5

    3761df12bebd38333cc8a961b6abfe2b

  • SHA1

    30bde90e1ab6b292ebf71920b21849228d4f950a

  • SHA256

    17fbdc887305e01bd6fc3ca93dbb2b50af8d8bb8135bda4a8b244107b991767a

  • SHA512

    6716576d6adc4acb7ffd66830395b82cde53d67dbcb97aa31104f6b33962610b98714fd4db4dbf86da61f79906a6e7401608c00fc2362bd74278f8dd061b06ad

  • SSDEEP

    12288:IMrJy90Xlf0XKD7LauHVkRZMInGpfC9nOCMfPkjFNvS+:ByAlfUKDNJPfC9nOCMfMf6+

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      17fbdc887305e01bd6fc3ca93dbb2b50af8d8bb8135bda4a8b244107b991767a

    • Size

      579KB

    • MD5

      3761df12bebd38333cc8a961b6abfe2b

    • SHA1

      30bde90e1ab6b292ebf71920b21849228d4f950a

    • SHA256

      17fbdc887305e01bd6fc3ca93dbb2b50af8d8bb8135bda4a8b244107b991767a

    • SHA512

      6716576d6adc4acb7ffd66830395b82cde53d67dbcb97aa31104f6b33962610b98714fd4db4dbf86da61f79906a6e7401608c00fc2362bd74278f8dd061b06ad

    • SSDEEP

      12288:IMrJy90Xlf0XKD7LauHVkRZMInGpfC9nOCMfPkjFNvS+:ByAlfUKDNJPfC9nOCMfMf6+

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks