General

  • Target

    69d5046bc0b69b064eeffb4208ef30cd5d527d660c91bccab3f79610f201e3f7

  • Size

    1.1MB

  • Sample

    241109-yyagystpfm

  • MD5

    a3fd68414dbcf3a3e5d21dfcc9dd5048

  • SHA1

    82c7568bd65bbb23858b9d4f013f3776db81aee1

  • SHA256

    69d5046bc0b69b064eeffb4208ef30cd5d527d660c91bccab3f79610f201e3f7

  • SHA512

    33641391d1f5b0b7d2f3a15800db4e1cc475f9d2c5f6bb8bfeb68b66236cf89eb49190b2749eba2ffe94793cebc054235aa886f2a39db89e60a07d9b7e487dff

  • SSDEEP

    24576:ZyGqwwmfkZzAZAFkoJWemzXzaaAdm95xy4wnaqaZu:MGqufk6AFkO+zDaa6m9ny4+e

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      69d5046bc0b69b064eeffb4208ef30cd5d527d660c91bccab3f79610f201e3f7

    • Size

      1.1MB

    • MD5

      a3fd68414dbcf3a3e5d21dfcc9dd5048

    • SHA1

      82c7568bd65bbb23858b9d4f013f3776db81aee1

    • SHA256

      69d5046bc0b69b064eeffb4208ef30cd5d527d660c91bccab3f79610f201e3f7

    • SHA512

      33641391d1f5b0b7d2f3a15800db4e1cc475f9d2c5f6bb8bfeb68b66236cf89eb49190b2749eba2ffe94793cebc054235aa886f2a39db89e60a07d9b7e487dff

    • SSDEEP

      24576:ZyGqwwmfkZzAZAFkoJWemzXzaaAdm95xy4wnaqaZu:MGqufk6AFkO+zDaa6m9ny4+e

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks