General

  • Target

    e0f360f681670e5025b5f67a65fa213adaca86c64b7b4863e06d5318eefa1995

  • Size

    1.1MB

  • Sample

    241105-zs4dhsybpf

  • MD5

    d95dde846f6d80403559b5cfcb51b853

  • SHA1

    6ddfd518e465d43e43c150a1050d4eda5d18e990

  • SHA256

    e0f360f681670e5025b5f67a65fa213adaca86c64b7b4863e06d5318eefa1995

  • SHA512

    cd9ac9358dc2405f0247e5d5a4f8caa848faa4d38af8436b60ecf6e8e10459b53c65b901f9046ca263fee913208745a43ab8395e8343b834d8ca9e3e42f2b993

  • SSDEEP

    24576:Uy8lMaJYxn+yEbOFk5IrahwzgFjG/4uhDWBeJZJ1HEBbVX3NkS1Y:jE5WcbOFk5pjZuUejJpEBbVXWS1

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      e0f360f681670e5025b5f67a65fa213adaca86c64b7b4863e06d5318eefa1995

    • Size

      1.1MB

    • MD5

      d95dde846f6d80403559b5cfcb51b853

    • SHA1

      6ddfd518e465d43e43c150a1050d4eda5d18e990

    • SHA256

      e0f360f681670e5025b5f67a65fa213adaca86c64b7b4863e06d5318eefa1995

    • SHA512

      cd9ac9358dc2405f0247e5d5a4f8caa848faa4d38af8436b60ecf6e8e10459b53c65b901f9046ca263fee913208745a43ab8395e8343b834d8ca9e3e42f2b993

    • SSDEEP

      24576:Uy8lMaJYxn+yEbOFk5IrahwzgFjG/4uhDWBeJZJ1HEBbVX3NkS1Y:jE5WcbOFk5pjZuUejJpEBbVXWS1

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks