General

  • Target

    259c471444aefbfb49e6d2b84872fbde7e96d983478f0f6807840a2c2dc00358.exe

  • Size

    1.0MB

  • Sample

    230518-q51nqaag31

  • MD5

    acc0494c47036396c97aaf4a27cd5f0c

  • SHA1

    3aa03956c981d32a3e826678d41fdb0a265955ee

  • SHA256

    259c471444aefbfb49e6d2b84872fbde7e96d983478f0f6807840a2c2dc00358

  • SHA512

    538b282e0b002f59280418e8ac6fb5271530742c063f388067c29217c55c3bb91ecc893a22da8004e7f42062846cf4a75e268c1b746b338b704fdf8030db0b12

  • SSDEEP

    24576:Oy4RJy3H4O0mgiszZ7O6gBHmd7u077TGDOQVkTo3E5q:d4Je90jEBHOu0GD3VkTb5

Malware Config

Extracted

Family

redline

Botnet

dusor

C2

185.161.248.25:4132

Attributes
  • auth_value

    b81217cf5a516122d407aeaf79d22948

Targets

    • Target

      259c471444aefbfb49e6d2b84872fbde7e96d983478f0f6807840a2c2dc00358.exe

    • Size

      1.0MB

    • MD5

      acc0494c47036396c97aaf4a27cd5f0c

    • SHA1

      3aa03956c981d32a3e826678d41fdb0a265955ee

    • SHA256

      259c471444aefbfb49e6d2b84872fbde7e96d983478f0f6807840a2c2dc00358

    • SHA512

      538b282e0b002f59280418e8ac6fb5271530742c063f388067c29217c55c3bb91ecc893a22da8004e7f42062846cf4a75e268c1b746b338b704fdf8030db0b12

    • SSDEEP

      24576:Oy4RJy3H4O0mgiszZ7O6gBHmd7u077TGDOQVkTo3E5q:d4Je90jEBHOu0GD3VkTb5

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks