General

  • Target

    8811c70c333468024f208d2de581e0e8387653980fdc15cf7c6564c2dc134156

  • Size

    1.1MB

  • Sample

    241106-shb3ysvlcr

  • MD5

    062c6511014f1aa596138ae8112058b3

  • SHA1

    458a98f9be2697b2cdcc4ca382accdd5e4578bd5

  • SHA256

    8811c70c333468024f208d2de581e0e8387653980fdc15cf7c6564c2dc134156

  • SHA512

    b42dc96ec2ea2d43f389af9ec47eba8fa5796dab9c2ad3635bcf043b0b9377327ba4916471c50b7cf8267b6f95aa1a5a23f53c86ec6fecf92658886082558a71

  • SSDEEP

    24576:LytjaKUU1ySw9FkZ61h45v0/Oovem1PB/n5SgkTGOU:+p9UU1y9FkZ61exjoBPBkiO

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      8811c70c333468024f208d2de581e0e8387653980fdc15cf7c6564c2dc134156

    • Size

      1.1MB

    • MD5

      062c6511014f1aa596138ae8112058b3

    • SHA1

      458a98f9be2697b2cdcc4ca382accdd5e4578bd5

    • SHA256

      8811c70c333468024f208d2de581e0e8387653980fdc15cf7c6564c2dc134156

    • SHA512

      b42dc96ec2ea2d43f389af9ec47eba8fa5796dab9c2ad3635bcf043b0b9377327ba4916471c50b7cf8267b6f95aa1a5a23f53c86ec6fecf92658886082558a71

    • SSDEEP

      24576:LytjaKUU1ySw9FkZ61h45v0/Oovem1PB/n5SgkTGOU:+p9UU1y9FkZ61exjoBPBkiO

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks