General

  • Target

    b2cfcb9a1584bf95e000511d20a0231f5ca479ef26c20ba7207445100118d125

  • Size

    1.1MB

  • Sample

    241108-tx3pwsvkcw

  • MD5

    c068e2d9dbc80a175a0ab31ebfa81101

  • SHA1

    59c4c0fd068737067b69a0b301da3911c28f5166

  • SHA256

    b2cfcb9a1584bf95e000511d20a0231f5ca479ef26c20ba7207445100118d125

  • SHA512

    29339b3c1e4bf5ec07a9af516491ee111b056d82a88390dc894abd147fb42cac6d0bc4a089029575930e7c88f04cc435ef2242b17031fefb1a2dce6521e88333

  • SSDEEP

    24576:LyYbUVbmVZiTObME2g931W0LqACOik88OG5alW3wOABj:+Y4sZgO4E2g9FhL2Oik88OAalPVB

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      b2cfcb9a1584bf95e000511d20a0231f5ca479ef26c20ba7207445100118d125

    • Size

      1.1MB

    • MD5

      c068e2d9dbc80a175a0ab31ebfa81101

    • SHA1

      59c4c0fd068737067b69a0b301da3911c28f5166

    • SHA256

      b2cfcb9a1584bf95e000511d20a0231f5ca479ef26c20ba7207445100118d125

    • SHA512

      29339b3c1e4bf5ec07a9af516491ee111b056d82a88390dc894abd147fb42cac6d0bc4a089029575930e7c88f04cc435ef2242b17031fefb1a2dce6521e88333

    • SSDEEP

      24576:LyYbUVbmVZiTObME2g931W0LqACOik88OG5alW3wOABj:+Y4sZgO4E2g9FhL2Oik88OAalPVB

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks