General

  • Target

    2c7c2abddadddc4eb190d66c65412fe8.bin

  • Size

    694KB

  • Sample

    230608-bk2b7aab94

  • MD5

    ee318a36cf55bea3623ef8e0beac444b

  • SHA1

    c87f82e376d743c597ed136e5fc86769295b4e0f

  • SHA256

    3ef8a07776baea8c11ff851ec6deb93d71522b5428c27aa39fcf468cf65c9a1e

  • SHA512

    1b9acffafcd930283f07479708844d308493e5e08f8c8cf98dcb1314d83f4a7c471e0935625cf9575da9a5bc17a587f6d909e142ef356f94f4b83e058aa6b108

  • SSDEEP

    12288:NCsES97WGmdNqEAZwEfdh2/peBBP4rrNGPZOJl/WGHWuszzlvySjWvhi:f97PfEAZwEfdh2/0BBQvNGROTsuqzsSt

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      51f0ef264a73c56b191eeeca19c29cd70d445e5b2f110176d9c21a681838c42a.exe

    • Size

      738KB

    • MD5

      2c7c2abddadddc4eb190d66c65412fe8

    • SHA1

      0aaa7f6509d1f33da676a510b06a2c0379818f20

    • SHA256

      51f0ef264a73c56b191eeeca19c29cd70d445e5b2f110176d9c21a681838c42a

    • SHA512

      9589372d81d7056b9b88b93297ad3b85600d7e5bfce224bde022f9cf669bc7fa45dbad60376d3a3834c79615c2ac509d9b9471f0513fd313e8a58d4887bb4e1f

    • SSDEEP

      12288:OMrey90ArTyG78Vwy8jsyFFXI0NB5VXeK+YyoiS42wtiBKcjZUK/jUE7:cyTTyG7V/DNHteaCPViBj2SUc

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks