General

  • Target

    1c1cc511c1f3499112bc0393298fd36901bb511ca3584679527ba969eef93b0c

  • Size

    1.1MB

  • Sample

    241109-p42nysxndk

  • MD5

    3fd6463219f8dc57df563f88a9ef3503

  • SHA1

    3f779a400e986f99ec711367814179332eb4e437

  • SHA256

    1c1cc511c1f3499112bc0393298fd36901bb511ca3584679527ba969eef93b0c

  • SHA512

    7717510907a5a16de272044182f2d33fefb7f350e56f74732f6d66cb568ddad91a425df67430fd8d666deed4b1fc3fc6f4bbf40ae587e844a01fb0d31b10cff4

  • SSDEEP

    24576:Qym1C1lmtE/g90YHWvgmOGVLd58bFjDcjqqDdNnmd5:Xm1C1lcE/g90Y2IASFj+5ZU

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      1c1cc511c1f3499112bc0393298fd36901bb511ca3584679527ba969eef93b0c

    • Size

      1.1MB

    • MD5

      3fd6463219f8dc57df563f88a9ef3503

    • SHA1

      3f779a400e986f99ec711367814179332eb4e437

    • SHA256

      1c1cc511c1f3499112bc0393298fd36901bb511ca3584679527ba969eef93b0c

    • SHA512

      7717510907a5a16de272044182f2d33fefb7f350e56f74732f6d66cb568ddad91a425df67430fd8d666deed4b1fc3fc6f4bbf40ae587e844a01fb0d31b10cff4

    • SSDEEP

      24576:Qym1C1lmtE/g90YHWvgmOGVLd58bFjDcjqqDdNnmd5:Xm1C1lcE/g90Y2IASFj+5ZU

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks