General

  • Target

    36e6b5c6297bfd9fab4c6c84c7e3e568e305412bfe05c6e6c12bb664d7eecd1a

  • Size

    579KB

  • Sample

    230605-kypd8aga91

  • MD5

    cfd7f2eff9cbb823950b5a28d314a030

  • SHA1

    ce7ecfb28b20d8f5a110c68749c0ba959a064545

  • SHA256

    36e6b5c6297bfd9fab4c6c84c7e3e568e305412bfe05c6e6c12bb664d7eecd1a

  • SHA512

    523f011c9ccf7dfe1dad0a6596e7a1c2663c928cebf32c992446b6f9d4454aa685cf36aa8a8abc669dbc0196d57f690736707f16f773f4c0d33693c0addd9f62

  • SSDEEP

    12288:/MrZy908Pfh1aJdas3WBPqT9MK5FbDV6QiOctieBu:OyfJ1GYUmPqMcLEieBu

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      36e6b5c6297bfd9fab4c6c84c7e3e568e305412bfe05c6e6c12bb664d7eecd1a

    • Size

      579KB

    • MD5

      cfd7f2eff9cbb823950b5a28d314a030

    • SHA1

      ce7ecfb28b20d8f5a110c68749c0ba959a064545

    • SHA256

      36e6b5c6297bfd9fab4c6c84c7e3e568e305412bfe05c6e6c12bb664d7eecd1a

    • SHA512

      523f011c9ccf7dfe1dad0a6596e7a1c2663c928cebf32c992446b6f9d4454aa685cf36aa8a8abc669dbc0196d57f690736707f16f773f4c0d33693c0addd9f62

    • SSDEEP

      12288:/MrZy908Pfh1aJdas3WBPqT9MK5FbDV6QiOctieBu:OyfJ1GYUmPqMcLEieBu

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks