General

  • Target

    072eaccf7a2c771a1610fb79074f0268c7a408e823848af617f8c05eb370641f

  • Size

    1.1MB

  • Sample

    230515-p2sm9sfd73

  • MD5

    670e99ed997af28452cd71f223d044cf

  • SHA1

    eb36071bb59afd2c6b8c29767925fee9262974ad

  • SHA256

    072eaccf7a2c771a1610fb79074f0268c7a408e823848af617f8c05eb370641f

  • SHA512

    411e24178741a612f2d99db659fc2963f65b4648f08b5dd78e58c9fad60b3ad132d5020bba3c9c3d96874843738bdf17c6b78795b99f8c8c841cafbf03da6c3d

  • SSDEEP

    24576:RyaL5x7wjZeCGqohPIAYJLrmsE7AhjaIaNiZni:EtjZxGqoF1eXmsE7AhRDZn

Malware Config

Extracted

Family

redline

Botnet

laris

C2

185.161.248.25:4132

Attributes
  • auth_value

    8774964465c41ab67a0a17432b084e1e

Targets

    • Target

      072eaccf7a2c771a1610fb79074f0268c7a408e823848af617f8c05eb370641f

    • Size

      1.1MB

    • MD5

      670e99ed997af28452cd71f223d044cf

    • SHA1

      eb36071bb59afd2c6b8c29767925fee9262974ad

    • SHA256

      072eaccf7a2c771a1610fb79074f0268c7a408e823848af617f8c05eb370641f

    • SHA512

      411e24178741a612f2d99db659fc2963f65b4648f08b5dd78e58c9fad60b3ad132d5020bba3c9c3d96874843738bdf17c6b78795b99f8c8c841cafbf03da6c3d

    • SSDEEP

      24576:RyaL5x7wjZeCGqohPIAYJLrmsE7AhjaIaNiZni:EtjZxGqoF1eXmsE7AhRDZn

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks