General

  • Target

    21bcc215616958d6e41751acec99b76badeeae3b948c1059436734213c9dcde3

  • Size

    1.1MB

  • Sample

    241106-ysgzvawlcy

  • MD5

    30a5e9aff9df873661a06505bf8533aa

  • SHA1

    6682750d17eb8eb5fafdfaf59a623059f9c9b996

  • SHA256

    21bcc215616958d6e41751acec99b76badeeae3b948c1059436734213c9dcde3

  • SHA512

    1169a2907c74c06caa1c81ce669598658998a804d695fd92f6f26aa667e5b699b640b2a7d4ebf45fbf94b11c987ea6ea3097a6d2531bfe25f0d9533bf26bd582

  • SSDEEP

    24576:GyAcH8YVU68yUeECg9GLPX6rva/EQiGUCytizeXQJa6fqikzPO:VA88Yu6/ECg9G76jy3iGUCy4zveD

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      21bcc215616958d6e41751acec99b76badeeae3b948c1059436734213c9dcde3

    • Size

      1.1MB

    • MD5

      30a5e9aff9df873661a06505bf8533aa

    • SHA1

      6682750d17eb8eb5fafdfaf59a623059f9c9b996

    • SHA256

      21bcc215616958d6e41751acec99b76badeeae3b948c1059436734213c9dcde3

    • SHA512

      1169a2907c74c06caa1c81ce669598658998a804d695fd92f6f26aa667e5b699b640b2a7d4ebf45fbf94b11c987ea6ea3097a6d2531bfe25f0d9533bf26bd582

    • SSDEEP

      24576:GyAcH8YVU68yUeECg9GLPX6rva/EQiGUCytizeXQJa6fqikzPO:VA88Yu6/ECg9G76jy3iGUCy4zveD

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks