General

  • Target

    d3970f171d76ecca9cf98135d46b3e69ed05d7d58ef0d653c58c0913da421988

  • Size

    729KB

  • Sample

    230605-r65vhahg5y

  • MD5

    48eca29d7556a5cc08229cd4fc9ba5d2

  • SHA1

    0c14043e4aa1e944a10ee2780b3a8d550af7fbef

  • SHA256

    d3970f171d76ecca9cf98135d46b3e69ed05d7d58ef0d653c58c0913da421988

  • SHA512

    be364bb23aa3fc5b33d5205f32d36ecc08e3c3039844560cc6f59006acf7a24fb8b795beb034dfcb9706b6d5f6ebb4d662226bcd1bddced45f312d012f3b88ff

  • SSDEEP

    12288:qMrKy90rZ4kpvm21J1sBgxunHFeeSD1Eb9lEss6lBEOmiZgekFE5J+84:8yflQRxYIeWyb9dfEDiqekkB4

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      d3970f171d76ecca9cf98135d46b3e69ed05d7d58ef0d653c58c0913da421988

    • Size

      729KB

    • MD5

      48eca29d7556a5cc08229cd4fc9ba5d2

    • SHA1

      0c14043e4aa1e944a10ee2780b3a8d550af7fbef

    • SHA256

      d3970f171d76ecca9cf98135d46b3e69ed05d7d58ef0d653c58c0913da421988

    • SHA512

      be364bb23aa3fc5b33d5205f32d36ecc08e3c3039844560cc6f59006acf7a24fb8b795beb034dfcb9706b6d5f6ebb4d662226bcd1bddced45f312d012f3b88ff

    • SSDEEP

      12288:qMrKy90rZ4kpvm21J1sBgxunHFeeSD1Eb9lEss6lBEOmiZgekFE5J+84:8yflQRxYIeWyb9dfEDiqekkB4

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks