General

  • Target

    e56b3caf4933bf394dc6ebef94601d753304aa2106e073cb6986cb58618afcf6

  • Size

    1.1MB

  • Sample

    241105-2yv1fatjdk

  • MD5

    d5e2157edf6ad658a66281bd991b4508

  • SHA1

    6cc590708a10b471975539a820fbe80e5025cbde

  • SHA256

    e56b3caf4933bf394dc6ebef94601d753304aa2106e073cb6986cb58618afcf6

  • SHA512

    73a8a02da66b16319ef5f994753fe50bba31ddd90a0ed5e917e51386506fc01d33c9238b3a0b19d6ee63aa760e8e3340f0751b2ea67a723f743de73e413e7b41

  • SSDEEP

    24576:Lyt7Cp5U4jETg9b9josSiDzJC1GYt4bMW2:+wp5UiETg9besJXJCbyp

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      e56b3caf4933bf394dc6ebef94601d753304aa2106e073cb6986cb58618afcf6

    • Size

      1.1MB

    • MD5

      d5e2157edf6ad658a66281bd991b4508

    • SHA1

      6cc590708a10b471975539a820fbe80e5025cbde

    • SHA256

      e56b3caf4933bf394dc6ebef94601d753304aa2106e073cb6986cb58618afcf6

    • SHA512

      73a8a02da66b16319ef5f994753fe50bba31ddd90a0ed5e917e51386506fc01d33c9238b3a0b19d6ee63aa760e8e3340f0751b2ea67a723f743de73e413e7b41

    • SSDEEP

      24576:Lyt7Cp5U4jETg9b9josSiDzJC1GYt4bMW2:+wp5UiETg9besJXJCbyp

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks