General

  • Target

    848b4118e71968a14ebb6062e66a439f9731a3b801c7fce71398a6221c8ea83a

  • Size

    1.1MB

  • Sample

    241107-r8vsbavakn

  • MD5

    7a35578ed06af38c4fe8a0608d7ce4d4

  • SHA1

    66cc7bde26c00df1d6f4764ec80e763d3d6071e3

  • SHA256

    848b4118e71968a14ebb6062e66a439f9731a3b801c7fce71398a6221c8ea83a

  • SHA512

    982576556dbb801c17e09ef9b50453a45075c7243a113f9f0ee28cf6533f63e418c8cb61568eb4c87bdfb06fb68f108fca0dda29ffc0fd7ff7769ccc1c6d4139

  • SSDEEP

    24576:kyruxxdwFyMxhUKhjwE1g9upCYl7xcXQdFQN6QXwfl:zruxxiyMxOKuE1g9urCQzmX

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      848b4118e71968a14ebb6062e66a439f9731a3b801c7fce71398a6221c8ea83a

    • Size

      1.1MB

    • MD5

      7a35578ed06af38c4fe8a0608d7ce4d4

    • SHA1

      66cc7bde26c00df1d6f4764ec80e763d3d6071e3

    • SHA256

      848b4118e71968a14ebb6062e66a439f9731a3b801c7fce71398a6221c8ea83a

    • SHA512

      982576556dbb801c17e09ef9b50453a45075c7243a113f9f0ee28cf6533f63e418c8cb61568eb4c87bdfb06fb68f108fca0dda29ffc0fd7ff7769ccc1c6d4139

    • SSDEEP

      24576:kyruxxdwFyMxhUKhjwE1g9upCYl7xcXQdFQN6QXwfl:zruxxiyMxOKuE1g9urCQzmX

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks