General

  • Target

    c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2

  • Size

    1.1MB

  • Sample

    241110-qxpaqa1keq

  • MD5

    734d5c6de2a90c1cb9a277de49c6056b

  • SHA1

    2703adb2643c72a0b6e70f7eeb11fc8e73539776

  • SHA256

    c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2

  • SHA512

    af3cb918843239781f147114601d7129f767dd409d9f1a8361644f905c2378f8f5ec999baeefce3858d64a48f00d9b0ed2629041f7230b83f75d3cceb0acb840

  • SSDEEP

    24576:qyFuSgO9UAl3jfiFkDnWKR2Fh6n8vze+5D/dgL6L4KnadU5g:xFu1O9UOjfiFkDWKILe+5D+L68KnaG

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2

    • Size

      1.1MB

    • MD5

      734d5c6de2a90c1cb9a277de49c6056b

    • SHA1

      2703adb2643c72a0b6e70f7eeb11fc8e73539776

    • SHA256

      c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2

    • SHA512

      af3cb918843239781f147114601d7129f767dd409d9f1a8361644f905c2378f8f5ec999baeefce3858d64a48f00d9b0ed2629041f7230b83f75d3cceb0acb840

    • SSDEEP

      24576:qyFuSgO9UAl3jfiFkDnWKR2Fh6n8vze+5D/dgL6L4KnadU5g:xFu1O9UOjfiFkDWKILe+5D+L68KnaG

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks