General

  • Target

    58ea45cb96543a6d77ae8e6ef7efecb11fb758f399b544209b392ddef8b61d12

  • Size

    1.1MB

  • Sample

    241107-kp2m7aygre

  • MD5

    3bc450f35bde9e4f6d3c1d9ef41774b6

  • SHA1

    7e5a9d634bdf72a8f2843abe242d3ccbec874d55

  • SHA256

    58ea45cb96543a6d77ae8e6ef7efecb11fb758f399b544209b392ddef8b61d12

  • SHA512

    f1208e67d223665a61c96b4ea311439e0490525eaffe305a0c1b80cb85ac5087f961a82f8180d9f46b0cb290d43a5cb6ef43381814fc0bdb71e6b783d80b70e5

  • SSDEEP

    24576:8y6tAW/aoxkFkKAa4moBNBEERhMXY6rhW6I2Taf1QtJKDPCW8:r6twIkFkda4moBNBXRh0fWZf1k0

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      58ea45cb96543a6d77ae8e6ef7efecb11fb758f399b544209b392ddef8b61d12

    • Size

      1.1MB

    • MD5

      3bc450f35bde9e4f6d3c1d9ef41774b6

    • SHA1

      7e5a9d634bdf72a8f2843abe242d3ccbec874d55

    • SHA256

      58ea45cb96543a6d77ae8e6ef7efecb11fb758f399b544209b392ddef8b61d12

    • SHA512

      f1208e67d223665a61c96b4ea311439e0490525eaffe305a0c1b80cb85ac5087f961a82f8180d9f46b0cb290d43a5cb6ef43381814fc0bdb71e6b783d80b70e5

    • SSDEEP

      24576:8y6tAW/aoxkFkKAa4moBNBEERhMXY6rhW6I2Taf1QtJKDPCW8:r6twIkFkda4moBNBXRh0fWZf1k0

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks