General

  • Target

    d947b533d06ba7324b0c3eacb1334f4ebe66c74995b16cb15c7a8a22f7ab3b10

  • Size

    1.1MB

  • Sample

    241110-3jpesawrey

  • MD5

    343052f390d293ecabe995a70836c0dd

  • SHA1

    6444fa46a5047447304638cf64eedbbab630060c

  • SHA256

    d947b533d06ba7324b0c3eacb1334f4ebe66c74995b16cb15c7a8a22f7ab3b10

  • SHA512

    1258817059c1bd1b86fd87dd6f5995d4e39e2391c362789655956ca05a9a545ec5be5c241722b0a6521fe270da10b3eb4766fb6c980dc46380ae102f5628ee7f

  • SSDEEP

    24576:uyTSI0CHFCgFktR/LwVMsv9D5vKzx2QNg+m:9GykgFkr/LjsvmxD

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      d947b533d06ba7324b0c3eacb1334f4ebe66c74995b16cb15c7a8a22f7ab3b10

    • Size

      1.1MB

    • MD5

      343052f390d293ecabe995a70836c0dd

    • SHA1

      6444fa46a5047447304638cf64eedbbab630060c

    • SHA256

      d947b533d06ba7324b0c3eacb1334f4ebe66c74995b16cb15c7a8a22f7ab3b10

    • SHA512

      1258817059c1bd1b86fd87dd6f5995d4e39e2391c362789655956ca05a9a545ec5be5c241722b0a6521fe270da10b3eb4766fb6c980dc46380ae102f5628ee7f

    • SSDEEP

      24576:uyTSI0CHFCgFktR/LwVMsv9D5vKzx2QNg+m:9GykgFkr/LjsvmxD

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks