General

  • Target

    bf6f2187eb1f65aa3597a8a8822da3886406d30aaed132cf3d137ccbecf89b10

  • Size

    736KB

  • Sample

    230606-hpzgqacd39

  • MD5

    af714950c9d94ccba685d6f9fa5bb211

  • SHA1

    c7203082a8c85bdebdbde81302ce23151ab24e3c

  • SHA256

    bf6f2187eb1f65aa3597a8a8822da3886406d30aaed132cf3d137ccbecf89b10

  • SHA512

    81a53c61cef4d85dff65e7960b9d10a2cba24a566384dd040c84ba1728d03f1cce44cca565884ea1ae33d48105f820e0038deb558b12df367d9c315ec09887ca

  • SSDEEP

    12288:lMrmy90+5YoQQTyu3Xl9N/V8ykbyoocWzfK68yqt0e9bKrzsF8tBe8jPf03:/yUsm0Xl/V8+hn8yi7Krzs0e8jE

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      bf6f2187eb1f65aa3597a8a8822da3886406d30aaed132cf3d137ccbecf89b10

    • Size

      736KB

    • MD5

      af714950c9d94ccba685d6f9fa5bb211

    • SHA1

      c7203082a8c85bdebdbde81302ce23151ab24e3c

    • SHA256

      bf6f2187eb1f65aa3597a8a8822da3886406d30aaed132cf3d137ccbecf89b10

    • SHA512

      81a53c61cef4d85dff65e7960b9d10a2cba24a566384dd040c84ba1728d03f1cce44cca565884ea1ae33d48105f820e0038deb558b12df367d9c315ec09887ca

    • SSDEEP

      12288:lMrmy90+5YoQQTyu3Xl9N/V8ykbyoocWzfK68yqt0e9bKrzsF8tBe8jPf03:/yUsm0Xl/V8+hn8yi7Krzs0e8jE

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks