General

  • Target

    419792b0c9e580a3bd4dc8f882a8621bcc60ae213b0cc781812775c75453e3bf

  • Size

    1.1MB

  • Sample

    241109-n799tstgnh

  • MD5

    13f34d22d76d7dc41c94fd55caa78066

  • SHA1

    d5588162edbdf5d78f7bae2af854c7d7191aff89

  • SHA256

    419792b0c9e580a3bd4dc8f882a8621bcc60ae213b0cc781812775c75453e3bf

  • SHA512

    8c5008d53aa48981eb56853c17e0a21e1b6211758e95edf2b54f50cfe7e3ba69e79f439b61c8a72c6f122ef3665d27b50ebcad7e7ae0464cf59fa1b2efe14ff3

  • SSDEEP

    24576:KypBZaB9ZEDlq1FkyhtJmT/c5ETtjZjrT/A9GoQPi7nv6MCd:RtaB11FkvLJY9GM7v

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      419792b0c9e580a3bd4dc8f882a8621bcc60ae213b0cc781812775c75453e3bf

    • Size

      1.1MB

    • MD5

      13f34d22d76d7dc41c94fd55caa78066

    • SHA1

      d5588162edbdf5d78f7bae2af854c7d7191aff89

    • SHA256

      419792b0c9e580a3bd4dc8f882a8621bcc60ae213b0cc781812775c75453e3bf

    • SHA512

      8c5008d53aa48981eb56853c17e0a21e1b6211758e95edf2b54f50cfe7e3ba69e79f439b61c8a72c6f122ef3665d27b50ebcad7e7ae0464cf59fa1b2efe14ff3

    • SSDEEP

      24576:KypBZaB9ZEDlq1FkyhtJmT/c5ETtjZjrT/A9GoQPi7nv6MCd:RtaB11FkvLJY9GM7v

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks