General

  • Target

    ec67fdd78f722e8e1fcb1788300fe71d4ed9b8a58203e920a95a09ca90015550N

  • Size

    316KB

  • Sample

    241110-2cw1lswlg1

  • MD5

    4c63d672e0334e8b80b64bdf39a4e360

  • SHA1

    16076404a98d62e0122b883269262d71d2cdb68f

  • SHA256

    ec67fdd78f722e8e1fcb1788300fe71d4ed9b8a58203e920a95a09ca90015550

  • SHA512

    95dd12136005162b7e3ec7095078ebb9b9f7868792095d235a87eec79b213895d1a104c390c3caf4495751509feab6b35ff3e11c9f48c8ee8fa207b5fd99eca2

  • SSDEEP

    6144:K2y+bnr+Fp0yN90QEN6vZrMgXGma0+qSNF1liGHpXZ7G:qMrRy90PmNRGfN3pk

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.75:4132

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Targets

    • Target

      ec67fdd78f722e8e1fcb1788300fe71d4ed9b8a58203e920a95a09ca90015550N

    • Size

      316KB

    • MD5

      4c63d672e0334e8b80b64bdf39a4e360

    • SHA1

      16076404a98d62e0122b883269262d71d2cdb68f

    • SHA256

      ec67fdd78f722e8e1fcb1788300fe71d4ed9b8a58203e920a95a09ca90015550

    • SHA512

      95dd12136005162b7e3ec7095078ebb9b9f7868792095d235a87eec79b213895d1a104c390c3caf4495751509feab6b35ff3e11c9f48c8ee8fa207b5fd99eca2

    • SSDEEP

      6144:K2y+bnr+Fp0yN90QEN6vZrMgXGma0+qSNF1liGHpXZ7G:qMrRy90PmNRGfN3pk

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks