General

  • Target

    ac9c425ed7bc46e25302e50a2fb3963dc68b61cfa455c0124154f32bea722538

  • Size

    1.1MB

  • Sample

    241105-25hnpa1fkp

  • MD5

    c121c92497f804a8e6f7c773f8ed35d8

  • SHA1

    11d1c6096c3524a6d4e28d40509fd7922f2a0a77

  • SHA256

    ac9c425ed7bc46e25302e50a2fb3963dc68b61cfa455c0124154f32bea722538

  • SHA512

    4a0ff702a05362644795fca9603a1f6d5c29dee89f9985d9cb5b1e90a5a9bd1516548b5b9f3f97a54d4b869b1086a991b53f95205ca05a50e30116d308459c12

  • SSDEEP

    24576:WyLDxj9eygKE1ECg918L91hr3ZZUXe96yhov7sFV9554YWbF:lLd5eygr1ECg9qL91lvUChoDs5554

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      ac9c425ed7bc46e25302e50a2fb3963dc68b61cfa455c0124154f32bea722538

    • Size

      1.1MB

    • MD5

      c121c92497f804a8e6f7c773f8ed35d8

    • SHA1

      11d1c6096c3524a6d4e28d40509fd7922f2a0a77

    • SHA256

      ac9c425ed7bc46e25302e50a2fb3963dc68b61cfa455c0124154f32bea722538

    • SHA512

      4a0ff702a05362644795fca9603a1f6d5c29dee89f9985d9cb5b1e90a5a9bd1516548b5b9f3f97a54d4b869b1086a991b53f95205ca05a50e30116d308459c12

    • SSDEEP

      24576:WyLDxj9eygKE1ECg918L91hr3ZZUXe96yhov7sFV9554YWbF:lLd5eygr1ECg9qL91lvUChoDs5554

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks