General

  • Target

    7aa66cd0bcc76f6c85319b710936a95b952c85b9174972f2b0f06784eb9ee4cf

  • Size

    1.1MB

  • Sample

    241109-vsxthsxngy

  • MD5

    1003bc90fe5d48bd554601f84568a802

  • SHA1

    2b8dc7e2b5f7bd89f4958b9c3e4bda74ecd06d0b

  • SHA256

    7aa66cd0bcc76f6c85319b710936a95b952c85b9174972f2b0f06784eb9ee4cf

  • SHA512

    98a694515b1486a15b8387d5edadf15f447b2955cdf5321e62d1121fa4bcef4dbe925c0bdd76b005f82f5c0a79fd44beddefc13397cf21886d6cc5bc6ed62397

  • SSDEEP

    24576:PybCM0IPU3csd3tyQFkAO0n9Dea4x3BzKNvYpSjTqtE0m2qS:aOM0Is3vqQFkh0nIJDOD0z

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      7aa66cd0bcc76f6c85319b710936a95b952c85b9174972f2b0f06784eb9ee4cf

    • Size

      1.1MB

    • MD5

      1003bc90fe5d48bd554601f84568a802

    • SHA1

      2b8dc7e2b5f7bd89f4958b9c3e4bda74ecd06d0b

    • SHA256

      7aa66cd0bcc76f6c85319b710936a95b952c85b9174972f2b0f06784eb9ee4cf

    • SHA512

      98a694515b1486a15b8387d5edadf15f447b2955cdf5321e62d1121fa4bcef4dbe925c0bdd76b005f82f5c0a79fd44beddefc13397cf21886d6cc5bc6ed62397

    • SSDEEP

      24576:PybCM0IPU3csd3tyQFkAO0n9Dea4x3BzKNvYpSjTqtE0m2qS:aOM0Is3vqQFkh0nIJDOD0z

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks