General

  • Target

    02b5ef0e9d0c5d291e79a13dea4413966033e8a3ecdaf8d40c9ffd01665c4182

  • Size

    1.1MB

  • Sample

    241105-xnylcsxdnk

  • MD5

    07481291fdf8cb8a017606ecd315594d

  • SHA1

    5d097b1e4a68a3dcfff0b526a9151535195a6356

  • SHA256

    02b5ef0e9d0c5d291e79a13dea4413966033e8a3ecdaf8d40c9ffd01665c4182

  • SHA512

    4d19e08794b1aaa57c0598e823098c2c08403cc09eff12e867afa5104d3d7ef2fb9ff5f0ca8efd0ec1acd42887f800e03f504346e2711bddd52f836676500228

  • SSDEEP

    12288:/Mrry90ZsPrJtz47PoDgaTBYyC0E8T0fkg9MVSc59Ib8YPHYEV6JCpuP4txl3E/f:8ytzmoM8E8lg9e5882Dcxwaii3aJLq

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      02b5ef0e9d0c5d291e79a13dea4413966033e8a3ecdaf8d40c9ffd01665c4182

    • Size

      1.1MB

    • MD5

      07481291fdf8cb8a017606ecd315594d

    • SHA1

      5d097b1e4a68a3dcfff0b526a9151535195a6356

    • SHA256

      02b5ef0e9d0c5d291e79a13dea4413966033e8a3ecdaf8d40c9ffd01665c4182

    • SHA512

      4d19e08794b1aaa57c0598e823098c2c08403cc09eff12e867afa5104d3d7ef2fb9ff5f0ca8efd0ec1acd42887f800e03f504346e2711bddd52f836676500228

    • SSDEEP

      12288:/Mrry90ZsPrJtz47PoDgaTBYyC0E8T0fkg9MVSc59Ib8YPHYEV6JCpuP4txl3E/f:8ytzmoM8E8lg9e5882Dcxwaii3aJLq

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks