General

  • Target

    b14faec9a52ff06963612ce51e48208fae4bb19dd47b1914192dcd12ff88902f

  • Size

    1.1MB

  • Sample

    241108-ftzxyaymfn

  • MD5

    14e34f42d1149b9c007d854f4ea79594

  • SHA1

    5ad712cb4e231f69c328eeb1f5d925adbf2c06f5

  • SHA256

    b14faec9a52ff06963612ce51e48208fae4bb19dd47b1914192dcd12ff88902f

  • SHA512

    faa5a0699b739d22f0ee0171c01722ab6164b2ee1511df8a51443243476933cff5118cd7b5c04a6c98ea7946b98b4eefc418f996bf6ade3a3ad0816ad3fe6a5e

  • SSDEEP

    24576:cyt90ic7sO1wnFkiXqpFZgz76sZMkquP0qNgqIu++h:LgB7n1wnFkoqp/E76yMWP0qKq/

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      b14faec9a52ff06963612ce51e48208fae4bb19dd47b1914192dcd12ff88902f

    • Size

      1.1MB

    • MD5

      14e34f42d1149b9c007d854f4ea79594

    • SHA1

      5ad712cb4e231f69c328eeb1f5d925adbf2c06f5

    • SHA256

      b14faec9a52ff06963612ce51e48208fae4bb19dd47b1914192dcd12ff88902f

    • SHA512

      faa5a0699b739d22f0ee0171c01722ab6164b2ee1511df8a51443243476933cff5118cd7b5c04a6c98ea7946b98b4eefc418f996bf6ade3a3ad0816ad3fe6a5e

    • SSDEEP

      24576:cyt90ic7sO1wnFkiXqpFZgz76sZMkquP0qNgqIu++h:LgB7n1wnFkoqp/E76yMWP0qKq/

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks