General

  • Target

    434bc4962df6a8847e926e69bde1882cb0b197c83b9db1b8a61ae367caa0edd1

  • Size

    1.1MB

  • Sample

    241107-fs53kavpes

  • MD5

    9b5ed9bc32a9dc5511b27a7a201a1bb4

  • SHA1

    63cf63b849838f9a371b173f56aa110d0e8b6c8b

  • SHA256

    434bc4962df6a8847e926e69bde1882cb0b197c83b9db1b8a61ae367caa0edd1

  • SHA512

    06ba5cbe56abc17cfc1edf1d4c4566ed48998f1ab3f57358f85ad02217257a161e8fe485e7675121b27831ad5a358e48f2b60ba7ecc0836b83f77c2dd6989f28

  • SSDEEP

    24576:zyv9Lx0GRQtoEDg9QfCJpXDCJPKC1QAiIf+gkZzg+9m:GXiaEDg9QEQZKC1lzG3D

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      434bc4962df6a8847e926e69bde1882cb0b197c83b9db1b8a61ae367caa0edd1

    • Size

      1.1MB

    • MD5

      9b5ed9bc32a9dc5511b27a7a201a1bb4

    • SHA1

      63cf63b849838f9a371b173f56aa110d0e8b6c8b

    • SHA256

      434bc4962df6a8847e926e69bde1882cb0b197c83b9db1b8a61ae367caa0edd1

    • SHA512

      06ba5cbe56abc17cfc1edf1d4c4566ed48998f1ab3f57358f85ad02217257a161e8fe485e7675121b27831ad5a358e48f2b60ba7ecc0836b83f77c2dd6989f28

    • SSDEEP

      24576:zyv9Lx0GRQtoEDg9QfCJpXDCJPKC1QAiIf+gkZzg+9m:GXiaEDg9QEQZKC1lzG3D

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks