General

  • Target

    83748c818c6d448271b08bf44cf373257ba6fa2ab0ba9c87ddd2d414401795c9

  • Size

    1.1MB

  • Sample

    241110-lc75wavaje

  • MD5

    3e0f4afd44479f6e99ed4fec4233a312

  • SHA1

    4b334d2ebc170bcda15254eb27b9b5e7e8c89a8e

  • SHA256

    83748c818c6d448271b08bf44cf373257ba6fa2ab0ba9c87ddd2d414401795c9

  • SHA512

    5e147953c8ef5f580afc5010b5d46bd2615cc6be5c226524ec01422569f3cc07a023d28096d12d2e84364f6141a4c037c7abf93749d268768526463a022e563d

  • SSDEEP

    24576:Ryhi/V2qUrgZ6EFk59bkUebfJqWQvnmNHvxZ9jxi0C1:EFrgZ6EFkTbkUEJPQvn6HL9j80

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      83748c818c6d448271b08bf44cf373257ba6fa2ab0ba9c87ddd2d414401795c9

    • Size

      1.1MB

    • MD5

      3e0f4afd44479f6e99ed4fec4233a312

    • SHA1

      4b334d2ebc170bcda15254eb27b9b5e7e8c89a8e

    • SHA256

      83748c818c6d448271b08bf44cf373257ba6fa2ab0ba9c87ddd2d414401795c9

    • SHA512

      5e147953c8ef5f580afc5010b5d46bd2615cc6be5c226524ec01422569f3cc07a023d28096d12d2e84364f6141a4c037c7abf93749d268768526463a022e563d

    • SSDEEP

      24576:Ryhi/V2qUrgZ6EFk59bkUebfJqWQvnmNHvxZ9jxi0C1:EFrgZ6EFkTbkUEJPQvn6HL9j80

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks