General

  • Target

    37b8dbef36614dcb5fd1adbc5475697dfa171f268610bcdc5edefa2946962582

  • Size

    1.1MB

  • Sample

    241110-q6jrla1mdk

  • MD5

    c8fa3bab0dd39fd5d7cd2c7ea87c0065

  • SHA1

    f72e7823079ce75859f123593239b18b5e01bff2

  • SHA256

    37b8dbef36614dcb5fd1adbc5475697dfa171f268610bcdc5edefa2946962582

  • SHA512

    3410e28379b1df8dcd01d24e1039da83e85fa530b40fdd2baea2f96912e517b5adaead2e81f2261a44ccbe9339f6a4b78a382a94745cd8c6703db9824c388734

  • SSDEEP

    24576:Gy3pkwhVZoD+xTtmYEgWtr5FkxvHmc91TULv12dP/Wu2qjNJ:V3pkwhVZoKR8Dtr5FkhH71ILv12dW

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      37b8dbef36614dcb5fd1adbc5475697dfa171f268610bcdc5edefa2946962582

    • Size

      1.1MB

    • MD5

      c8fa3bab0dd39fd5d7cd2c7ea87c0065

    • SHA1

      f72e7823079ce75859f123593239b18b5e01bff2

    • SHA256

      37b8dbef36614dcb5fd1adbc5475697dfa171f268610bcdc5edefa2946962582

    • SHA512

      3410e28379b1df8dcd01d24e1039da83e85fa530b40fdd2baea2f96912e517b5adaead2e81f2261a44ccbe9339f6a4b78a382a94745cd8c6703db9824c388734

    • SSDEEP

      24576:Gy3pkwhVZoD+xTtmYEgWtr5FkxvHmc91TULv12dP/Wu2qjNJ:V3pkwhVZoKR8Dtr5FkhH71ILv12dW

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks