General

  • Target

    741016cc122506710d11ca226ab36257a02481e36193c75775b1985b9d01e84b

  • Size

    1.0MB

  • Sample

    230522-ffgt7seb24

  • MD5

    7a8faffed123ebc592314c0de1a688ea

  • SHA1

    1ecc8c183781e85da1bd4c0d11073c8bba62544d

  • SHA256

    741016cc122506710d11ca226ab36257a02481e36193c75775b1985b9d01e84b

  • SHA512

    b5dafaa69c9943d7c00fa96f86f98e8c54a812c0ff8148d548e8531f82997ae41b01951d1342dcbf213a17bcc8204424d1f8a5b4a320805ba83d22e9e508c304

  • SSDEEP

    24576:xyfKEYSJYVhTcK7eqASdh7qa2mTz9KdEj81JLEV9EbRLxp8:kcxz77eqXdh7b2AKGjeJYVkp

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.37:4138

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Targets

    • Target

      741016cc122506710d11ca226ab36257a02481e36193c75775b1985b9d01e84b

    • Size

      1.0MB

    • MD5

      7a8faffed123ebc592314c0de1a688ea

    • SHA1

      1ecc8c183781e85da1bd4c0d11073c8bba62544d

    • SHA256

      741016cc122506710d11ca226ab36257a02481e36193c75775b1985b9d01e84b

    • SHA512

      b5dafaa69c9943d7c00fa96f86f98e8c54a812c0ff8148d548e8531f82997ae41b01951d1342dcbf213a17bcc8204424d1f8a5b4a320805ba83d22e9e508c304

    • SSDEEP

      24576:xyfKEYSJYVhTcK7eqASdh7qa2mTz9KdEj81JLEV9EbRLxp8:kcxz77eqXdh7b2AKGjeJYVkp

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks