General

  • Target

    7ad1216222967a5e2974a92444c06874a03b6e2545158ef4d1aa5a1523d8068d

  • Size

    1.1MB

  • Sample

    241109-nh98jasng1

  • MD5

    9c96a76c24c5f953bcef0adfa6792940

  • SHA1

    08030f52da1c23db2e16f5b0f8e7cd6939a8fe98

  • SHA256

    7ad1216222967a5e2974a92444c06874a03b6e2545158ef4d1aa5a1523d8068d

  • SHA512

    345c8f613e1a15bf861f80ff81253aa5e7fe36afa1af94ea3a1eb38f85519d6599c0938530cfbad9f74fe8c93e60b00a3a05d0a9b2b36e3cc2020bb396f30ed6

  • SSDEEP

    24576:Dy9lvhILZCk7vm/8FkbK4G4yxJSEwgPhMmLEj7Tm0xYMD:Wnvh4hi8FkD6wEhbEPa

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      7ad1216222967a5e2974a92444c06874a03b6e2545158ef4d1aa5a1523d8068d

    • Size

      1.1MB

    • MD5

      9c96a76c24c5f953bcef0adfa6792940

    • SHA1

      08030f52da1c23db2e16f5b0f8e7cd6939a8fe98

    • SHA256

      7ad1216222967a5e2974a92444c06874a03b6e2545158ef4d1aa5a1523d8068d

    • SHA512

      345c8f613e1a15bf861f80ff81253aa5e7fe36afa1af94ea3a1eb38f85519d6599c0938530cfbad9f74fe8c93e60b00a3a05d0a9b2b36e3cc2020bb396f30ed6

    • SSDEEP

      24576:Dy9lvhILZCk7vm/8FkbK4G4yxJSEwgPhMmLEj7Tm0xYMD:Wnvh4hi8FkD6wEhbEPa

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks