General

  • Target

    6a3abfd66ff14191ca0917eae121331769128684e647c3797932f7eb10938360

  • Size

    1.1MB

  • Sample

    241108-vz4kmswdkg

  • MD5

    663e686e49f9a22580480d8efa738896

  • SHA1

    266d4202f2199ba168938a8706f3032ef51797d4

  • SHA256

    6a3abfd66ff14191ca0917eae121331769128684e647c3797932f7eb10938360

  • SHA512

    7a683f78427c5ed59319b11dc36b8f8930551840cb7c9b1bb63bd21188b2384c0586ed2cda718a3c42f3ec3a7b5202a7348a3d24bfd3b7139f6df377e48f0fe2

  • SSDEEP

    24576:LyiqLAzsAdK3WE5Bm8wFkuvncDGuN8B9jSIjMmDwNlb1X6WF9:+Daq3m8wFkskK9+IjMmilbR6Y

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      6a3abfd66ff14191ca0917eae121331769128684e647c3797932f7eb10938360

    • Size

      1.1MB

    • MD5

      663e686e49f9a22580480d8efa738896

    • SHA1

      266d4202f2199ba168938a8706f3032ef51797d4

    • SHA256

      6a3abfd66ff14191ca0917eae121331769128684e647c3797932f7eb10938360

    • SHA512

      7a683f78427c5ed59319b11dc36b8f8930551840cb7c9b1bb63bd21188b2384c0586ed2cda718a3c42f3ec3a7b5202a7348a3d24bfd3b7139f6df377e48f0fe2

    • SSDEEP

      24576:LyiqLAzsAdK3WE5Bm8wFkuvncDGuN8B9jSIjMmDwNlb1X6WF9:+Daq3m8wFkskK9+IjMmilbR6Y

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks