General

  • Target

    1967152872436f4ed9b38275d2dac98199c2ff1f473e1eac47a281c060926e0d

  • Size

    1.1MB

  • Sample

    241110-j4zlpstbka

  • MD5

    5eaaa24dceadaa18668e1fb6ff6a84df

  • SHA1

    44a1a8ba0d8554dd4da8052fefda51982c39c80d

  • SHA256

    1967152872436f4ed9b38275d2dac98199c2ff1f473e1eac47a281c060926e0d

  • SHA512

    a6083359b11e8f28d9fbdc46ca34af016cee8c289564c47fac552f2eb298b63a57f1230b34daeebd8213c2560ec4fc48eb4923bb07faa660884bfb2a75f011d6

  • SSDEEP

    24576:iyZfA8Wxe43bE0g9M0UoImR/2ms5lXhT8VKZ91jMd/B:JS5s0E0g9M0UMpO58VK/1gd

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      1967152872436f4ed9b38275d2dac98199c2ff1f473e1eac47a281c060926e0d

    • Size

      1.1MB

    • MD5

      5eaaa24dceadaa18668e1fb6ff6a84df

    • SHA1

      44a1a8ba0d8554dd4da8052fefda51982c39c80d

    • SHA256

      1967152872436f4ed9b38275d2dac98199c2ff1f473e1eac47a281c060926e0d

    • SHA512

      a6083359b11e8f28d9fbdc46ca34af016cee8c289564c47fac552f2eb298b63a57f1230b34daeebd8213c2560ec4fc48eb4923bb07faa660884bfb2a75f011d6

    • SSDEEP

      24576:iyZfA8Wxe43bE0g9M0UoImR/2ms5lXhT8VKZ91jMd/B:JS5s0E0g9M0UMpO58VK/1gd

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks