General

  • Target

    7e07717a3448f1e426414204a037acd28d5bdbee8a66fb5241b36bd4c2035a5b

  • Size

    1.1MB

  • Sample

    241106-3kpf6szjgx

  • MD5

    d6cb66058b36d33379c1f1bdb8aaa61a

  • SHA1

    d48e7469768165bff0d1b6f291353f33beecb0ac

  • SHA256

    7e07717a3448f1e426414204a037acd28d5bdbee8a66fb5241b36bd4c2035a5b

  • SHA512

    49eacc3648a6cbabfc3e3f1f5d95b2713745db17e05009bf942cd079da9ae9d8e3c2b8d1a2453972d220cd75dc0ca028be322f5348505202eb67ab4f58f82f16

  • SSDEEP

    24576:IyS+vaQHuE0g9Pzd8CyZ0L5LFHkM/vHrsMkqESLXtrR1:PpaHE0g9Pzd8OLlFHkMnHrl3XZR

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      7e07717a3448f1e426414204a037acd28d5bdbee8a66fb5241b36bd4c2035a5b

    • Size

      1.1MB

    • MD5

      d6cb66058b36d33379c1f1bdb8aaa61a

    • SHA1

      d48e7469768165bff0d1b6f291353f33beecb0ac

    • SHA256

      7e07717a3448f1e426414204a037acd28d5bdbee8a66fb5241b36bd4c2035a5b

    • SHA512

      49eacc3648a6cbabfc3e3f1f5d95b2713745db17e05009bf942cd079da9ae9d8e3c2b8d1a2453972d220cd75dc0ca028be322f5348505202eb67ab4f58f82f16

    • SSDEEP

      24576:IyS+vaQHuE0g9Pzd8CyZ0L5LFHkM/vHrsMkqESLXtrR1:PpaHE0g9Pzd8OLlFHkMnHrl3XZR

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks