General

  • Target

    191f918020c220afd3cfc0edb47fc42260208a69e1bd125636546c675c38ab7f

  • Size

    1.1MB

  • Sample

    241110-3tenbs1kcn

  • MD5

    b6459e30c1cf92b5eccdec46e538cbe5

  • SHA1

    d0f4c7a4eab84f957db8dda4797c1d18f4887369

  • SHA256

    191f918020c220afd3cfc0edb47fc42260208a69e1bd125636546c675c38ab7f

  • SHA512

    90abf443dd6fb93d60e562b28f939d630a18f21e992db9a69c328212c377af7a64d0d66e5f0935c82ce47d88f010aa271498847f40bb8b69a9aad6296b5e6cc4

  • SSDEEP

    24576:syAlWZPduwMUOrrvTUTZUxtvJorz0vyKPGHtMUimMd3slaTjgd:bA4ZP8UWvTU1UxZJYAvyKEpxMd80fg

Malware Config

Extracted

Family

redline

Botnet

dogma

C2

185.161.248.75:4132

Attributes
  • auth_value

    d6c5d36e9aa03c956dc76aa0fcbe3639

Targets

    • Target

      191f918020c220afd3cfc0edb47fc42260208a69e1bd125636546c675c38ab7f

    • Size

      1.1MB

    • MD5

      b6459e30c1cf92b5eccdec46e538cbe5

    • SHA1

      d0f4c7a4eab84f957db8dda4797c1d18f4887369

    • SHA256

      191f918020c220afd3cfc0edb47fc42260208a69e1bd125636546c675c38ab7f

    • SHA512

      90abf443dd6fb93d60e562b28f939d630a18f21e992db9a69c328212c377af7a64d0d66e5f0935c82ce47d88f010aa271498847f40bb8b69a9aad6296b5e6cc4

    • SSDEEP

      24576:syAlWZPduwMUOrrvTUTZUxtvJorz0vyKPGHtMUimMd3slaTjgd:bA4ZP8UWvTU1UxZJYAvyKEpxMd80fg

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks