General

  • Target

    3df0115bd9ccb06f290473eaea9f490086bf98156727fa912acb04a1accb09db

  • Size

    1.2MB

  • Sample

    230501-1pdjcsgh32

  • MD5

    d44c35515ad09f67f35ca83a9d48675c

  • SHA1

    cb6b0ff4812f27327fd88da308ed029293f5dc48

  • SHA256

    3df0115bd9ccb06f290473eaea9f490086bf98156727fa912acb04a1accb09db

  • SHA512

    27572c1e0dff8c339123c851dd1f2fc43808e0bbd9e21c8f6734cd8e27f8dd5bee2ac79fb8181194a9e2d15adbde60bb3377c46999abaab7b4e99229dbcdd429

  • SSDEEP

    24576:vyXCLWU0n6TVQBOvUegcKcsF9Lz07qY5VHPcV:6XCaU0+QlHUsvLz07qYPvc

Malware Config

Extracted

Family

redline

Botnet

lofa

C2

185.161.248.73:4164

Attributes
  • auth_value

    3442ba767c6a30cde747101942f34a3a

Targets

    • Target

      3df0115bd9ccb06f290473eaea9f490086bf98156727fa912acb04a1accb09db

    • Size

      1.2MB

    • MD5

      d44c35515ad09f67f35ca83a9d48675c

    • SHA1

      cb6b0ff4812f27327fd88da308ed029293f5dc48

    • SHA256

      3df0115bd9ccb06f290473eaea9f490086bf98156727fa912acb04a1accb09db

    • SHA512

      27572c1e0dff8c339123c851dd1f2fc43808e0bbd9e21c8f6734cd8e27f8dd5bee2ac79fb8181194a9e2d15adbde60bb3377c46999abaab7b4e99229dbcdd429

    • SSDEEP

      24576:vyXCLWU0n6TVQBOvUegcKcsF9Lz07qY5VHPcV:6XCaU0+QlHUsvLz07qYPvc

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks