General

  • Target

    6c1d2239286fca6747797c6fb69f6f2fa0ebd5ef6bfe45d462b803bf9d6fc094

  • Size

    736KB

  • Sample

    230606-e55rwsca45

  • MD5

    6e52587bf938d0e17a7c8a348ba17add

  • SHA1

    eadcdea094a50f23b3c58009b589487c2bb9c651

  • SHA256

    6c1d2239286fca6747797c6fb69f6f2fa0ebd5ef6bfe45d462b803bf9d6fc094

  • SHA512

    d5f51db624649976c76f0d380e0c254bcc44fa3e73c7ee934ee9ef48310cc5b1d65651d945e9295a32fe15134646a6911d8d30f24d00525481d4d1e87f380a68

  • SSDEEP

    12288:wMrwy90IkrhgHqJh3avllMswqivXpsdO4OZaEE4Q9EXz4JbTdTipwz9u1B:Qyjk/ZkMsw3scZm4E+GfdupGm

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      6c1d2239286fca6747797c6fb69f6f2fa0ebd5ef6bfe45d462b803bf9d6fc094

    • Size

      736KB

    • MD5

      6e52587bf938d0e17a7c8a348ba17add

    • SHA1

      eadcdea094a50f23b3c58009b589487c2bb9c651

    • SHA256

      6c1d2239286fca6747797c6fb69f6f2fa0ebd5ef6bfe45d462b803bf9d6fc094

    • SHA512

      d5f51db624649976c76f0d380e0c254bcc44fa3e73c7ee934ee9ef48310cc5b1d65651d945e9295a32fe15134646a6911d8d30f24d00525481d4d1e87f380a68

    • SSDEEP

      12288:wMrwy90IkrhgHqJh3avllMswqivXpsdO4OZaEE4Q9EXz4JbTdTipwz9u1B:Qyjk/ZkMsw3scZm4E+GfdupGm

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks