General

  • Target

    417f0df14ed54df4d6abe47c52b710cfcbad13b10241fe140b69d2529326597f

  • Size

    1.1MB

  • Sample

    241105-te7acswqdn

  • MD5

    4858809d2214028e467e69af9992ca54

  • SHA1

    dee1decd188e5adadf5d513cc323898ea8b19f7d

  • SHA256

    417f0df14ed54df4d6abe47c52b710cfcbad13b10241fe140b69d2529326597f

  • SHA512

    1725da271ea138cff7bd28f3b0f2e418d29ff54d15cbfc9c206b9d33c31f4095fe08ce6c573af17fd3b14b5f3ee49f8265c70fc49deb02c79e2ac17cf7aa3fd6

  • SSDEEP

    24576:BynczzQRTElg94pG0DR6hNLjXvbUe70l/BLemEmO3:0nszQRTElg9EGYaN7ZGBLemEm

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      417f0df14ed54df4d6abe47c52b710cfcbad13b10241fe140b69d2529326597f

    • Size

      1.1MB

    • MD5

      4858809d2214028e467e69af9992ca54

    • SHA1

      dee1decd188e5adadf5d513cc323898ea8b19f7d

    • SHA256

      417f0df14ed54df4d6abe47c52b710cfcbad13b10241fe140b69d2529326597f

    • SHA512

      1725da271ea138cff7bd28f3b0f2e418d29ff54d15cbfc9c206b9d33c31f4095fe08ce6c573af17fd3b14b5f3ee49f8265c70fc49deb02c79e2ac17cf7aa3fd6

    • SSDEEP

      24576:BynczzQRTElg94pG0DR6hNLjXvbUe70l/BLemEmO3:0nszQRTElg9EGYaN7ZGBLemEm

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks