General

  • Target

    e0685a10bb69c5952b9c63181353a23771cfbfd3f6823111a9ee2259ed65806c

  • Size

    1.1MB

  • Sample

    241109-n9lz1stgqd

  • MD5

    29ed9946f72410bc949585ed2f8c2678

  • SHA1

    4b556a6bbe528faf80bdc4e609f2074e137783ba

  • SHA256

    e0685a10bb69c5952b9c63181353a23771cfbfd3f6823111a9ee2259ed65806c

  • SHA512

    13c9a48dddf4740b54a37442a1d710f26c3de53f52fa7616c745215a32a0eed4675d3af0b3c01d63f909b307d18eaebf81f5928a2826f00349e1ad9797a48623

  • SSDEEP

    24576:PynRyo+QfigwFkmLgA0VrADLwhXPmydDO3jZh5aj9Tgt:anz+QfigwFkQg3L+WDOT352g

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      e0685a10bb69c5952b9c63181353a23771cfbfd3f6823111a9ee2259ed65806c

    • Size

      1.1MB

    • MD5

      29ed9946f72410bc949585ed2f8c2678

    • SHA1

      4b556a6bbe528faf80bdc4e609f2074e137783ba

    • SHA256

      e0685a10bb69c5952b9c63181353a23771cfbfd3f6823111a9ee2259ed65806c

    • SHA512

      13c9a48dddf4740b54a37442a1d710f26c3de53f52fa7616c745215a32a0eed4675d3af0b3c01d63f909b307d18eaebf81f5928a2826f00349e1ad9797a48623

    • SSDEEP

      24576:PynRyo+QfigwFkmLgA0VrADLwhXPmydDO3jZh5aj9Tgt:anz+QfigwFkQg3L+WDOT352g

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks