General

  • Target

    525bf344f36662d6e623f459a36295cb2571ae09d90d0800fe0182b0f5563175

  • Size

    1.1MB

  • Sample

    241109-275k8sxkcj

  • MD5

    c57cea4f326050854b05b3e323539412

  • SHA1

    29f5113b14363592f3186a928c2f70b7ad52bd1a

  • SHA256

    525bf344f36662d6e623f459a36295cb2571ae09d90d0800fe0182b0f5563175

  • SHA512

    bf5d2b2c29e8cd897a29258879ee8d1aa875610e43a5bf24fed5afbbe9f847a55c91b2c7aca75e889bf987343e696c11ebfd19cbd65c63e141df767d0ace260e

  • SSDEEP

    24576:5yz7eYIDsEXfmKL5FksGX1uvjC1Ltfki5TPZfUtBq7qs:s/eYIDrXfmi5FkbMvMlkkVcu

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      525bf344f36662d6e623f459a36295cb2571ae09d90d0800fe0182b0f5563175

    • Size

      1.1MB

    • MD5

      c57cea4f326050854b05b3e323539412

    • SHA1

      29f5113b14363592f3186a928c2f70b7ad52bd1a

    • SHA256

      525bf344f36662d6e623f459a36295cb2571ae09d90d0800fe0182b0f5563175

    • SHA512

      bf5d2b2c29e8cd897a29258879ee8d1aa875610e43a5bf24fed5afbbe9f847a55c91b2c7aca75e889bf987343e696c11ebfd19cbd65c63e141df767d0ace260e

    • SSDEEP

      24576:5yz7eYIDsEXfmKL5FksGX1uvjC1Ltfki5TPZfUtBq7qs:s/eYIDrXfmi5FkbMvMlkkVcu

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks