General

  • Target

    4c900573993862c4d460d3e6090514da84aa3d08cf439cff41b90655620db9b1

  • Size

    1.1MB

  • Sample

    241109-cgz6dsvdqg

  • MD5

    7bdb2d08182b4f2da77d04d7f7e19a82

  • SHA1

    a28a0f73f723dfcc9a2086290512a8f6f950cdca

  • SHA256

    4c900573993862c4d460d3e6090514da84aa3d08cf439cff41b90655620db9b1

  • SHA512

    01329b6dc46423d8a8c1a712cbee6202c2569103cb7839dec8bc7a910140ce3aefc864bc78f9f266691efd182856dddd8a67854291f94c134b8823685ebc51cf

  • SSDEEP

    24576:9ywp34KW/BtBsdC9iVFkOSLb8zaLew1DJpECmRzNAhF5poCt:YMVEms9iVFkOWb8S/J5mRziRpD

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      4c900573993862c4d460d3e6090514da84aa3d08cf439cff41b90655620db9b1

    • Size

      1.1MB

    • MD5

      7bdb2d08182b4f2da77d04d7f7e19a82

    • SHA1

      a28a0f73f723dfcc9a2086290512a8f6f950cdca

    • SHA256

      4c900573993862c4d460d3e6090514da84aa3d08cf439cff41b90655620db9b1

    • SHA512

      01329b6dc46423d8a8c1a712cbee6202c2569103cb7839dec8bc7a910140ce3aefc864bc78f9f266691efd182856dddd8a67854291f94c134b8823685ebc51cf

    • SSDEEP

      24576:9ywp34KW/BtBsdC9iVFkOSLb8zaLew1DJpECmRzNAhF5poCt:YMVEms9iVFkOWb8S/J5mRziRpD

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks