General

  • Target

    ccfd41c9ac7acffbeeee894ae84997e82fce0df7de84c53f25153019480f19a8

  • Size

    1.1MB

  • Sample

    241105-r2z4fstekr

  • MD5

    49f20ba05a2e8735318d804d3e7b4240

  • SHA1

    ac2dc0060bb1ccf7f30f15f78a4e6c4b07b9186a

  • SHA256

    ccfd41c9ac7acffbeeee894ae84997e82fce0df7de84c53f25153019480f19a8

  • SHA512

    ae55c7bedfc5b94b5e1a2d1efac9c34cbb9aa88b8ff701072bf319fc325f94db71992bf81325188aa2ce3c5a433f7ee1b372e492307bfe8e4540fae09e184770

  • SSDEEP

    24576:CyO5dapQFTFk3C5eay+scyZkxBZmGUdTXvWK:pwspQFTFkyibwmBdTe

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      ccfd41c9ac7acffbeeee894ae84997e82fce0df7de84c53f25153019480f19a8

    • Size

      1.1MB

    • MD5

      49f20ba05a2e8735318d804d3e7b4240

    • SHA1

      ac2dc0060bb1ccf7f30f15f78a4e6c4b07b9186a

    • SHA256

      ccfd41c9ac7acffbeeee894ae84997e82fce0df7de84c53f25153019480f19a8

    • SHA512

      ae55c7bedfc5b94b5e1a2d1efac9c34cbb9aa88b8ff701072bf319fc325f94db71992bf81325188aa2ce3c5a433f7ee1b372e492307bfe8e4540fae09e184770

    • SSDEEP

      24576:CyO5dapQFTFk3C5eay+scyZkxBZmGUdTXvWK:pwspQFTFkyibwmBdTe

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks