General

  • Target

    beeefbaf87551a3b824af0ab3074943f7782c7566a415969f8cd80c1d6b24348

  • Size

    739KB

  • Sample

    230606-tdsqksee43

  • MD5

    ea64b99e2ce9169bd1ab65e16cf7a5b4

  • SHA1

    2f30cb4adbd4b8a68a54548d79d2f81d28182789

  • SHA256

    beeefbaf87551a3b824af0ab3074943f7782c7566a415969f8cd80c1d6b24348

  • SHA512

    cf528ffcc866b8dce882107051c92796b86c8ed2bde05e1c8a615959315c90150557f867a404d4be252ef1ed34654b147e636b3720b647f655529b4330711b84

  • SSDEEP

    12288:5MrSy90EqwwwGJBJyFhOTywv17WUtggeS3c1KyWgNbtXGm0N2eX:LyFqskyF2/oyg3wyWubtXN0weX

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      beeefbaf87551a3b824af0ab3074943f7782c7566a415969f8cd80c1d6b24348

    • Size

      739KB

    • MD5

      ea64b99e2ce9169bd1ab65e16cf7a5b4

    • SHA1

      2f30cb4adbd4b8a68a54548d79d2f81d28182789

    • SHA256

      beeefbaf87551a3b824af0ab3074943f7782c7566a415969f8cd80c1d6b24348

    • SHA512

      cf528ffcc866b8dce882107051c92796b86c8ed2bde05e1c8a615959315c90150557f867a404d4be252ef1ed34654b147e636b3720b647f655529b4330711b84

    • SSDEEP

      12288:5MrSy90EqwwwGJBJyFhOTywv17WUtggeS3c1KyWgNbtXGm0N2eX:LyFqskyF2/oyg3wyWubtXN0weX

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks