General

  • Target

    421ccdf8a211f8c47743c32599ae4358d3ecbc0ed5a57156322527692e337c1b

  • Size

    1.1MB

  • Sample

    241108-sb6nzsvapk

  • MD5

    aa1091a5d64d8546644e51c23d172ce4

  • SHA1

    c4ff45a85fa6338bf2735d96f1a60429d0e1b30c

  • SHA256

    421ccdf8a211f8c47743c32599ae4358d3ecbc0ed5a57156322527692e337c1b

  • SHA512

    238e4c3b24b45d20578996c65ded6971bc184cdabd1a856fec769913ded10033720182a36f99c3115fbf6af66b6815b07b940be3039cd8a39b86199c97bf0e52

  • SSDEEP

    24576:Dy7T9aKzdUr7WFkiPEb8gLA0lcvUWUHq9AG0B84b+ZWfx:Wtp5E7WFk78gFlcvUWsr82+ZW

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      421ccdf8a211f8c47743c32599ae4358d3ecbc0ed5a57156322527692e337c1b

    • Size

      1.1MB

    • MD5

      aa1091a5d64d8546644e51c23d172ce4

    • SHA1

      c4ff45a85fa6338bf2735d96f1a60429d0e1b30c

    • SHA256

      421ccdf8a211f8c47743c32599ae4358d3ecbc0ed5a57156322527692e337c1b

    • SHA512

      238e4c3b24b45d20578996c65ded6971bc184cdabd1a856fec769913ded10033720182a36f99c3115fbf6af66b6815b07b940be3039cd8a39b86199c97bf0e52

    • SSDEEP

      24576:Dy7T9aKzdUr7WFkiPEb8gLA0lcvUWUHq9AG0B84b+ZWfx:Wtp5E7WFk78gFlcvUWsr82+ZW

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks