General

  • Target

    138b12a61b355225f3f58e24129be621df2f25bd956282d0863d688102924c86

  • Size

    1.1MB

  • Sample

    241110-ssshpayng1

  • MD5

    dd42ea4b50fe981b21dfad3ef57d00ac

  • SHA1

    3d669fabb05229f6f548580a1068196fd39d5a89

  • SHA256

    138b12a61b355225f3f58e24129be621df2f25bd956282d0863d688102924c86

  • SHA512

    f9a8643e844b7be561a3d0dd516d57d2702e57cfd784289a3943e642b470e6406fed0b5e4bbd3d804e27befdd2144fba8887e0703b70c3e0a6419e2bf9fe069f

  • SSDEEP

    24576:oyrQ8SDb5zg4FkaASxyZY+e9ceTSIm7mDlj41LaT9ftxb4U8:vrQ8SDb5U4FkaDxyZY+PuSP7mDl0wpfJ

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      138b12a61b355225f3f58e24129be621df2f25bd956282d0863d688102924c86

    • Size

      1.1MB

    • MD5

      dd42ea4b50fe981b21dfad3ef57d00ac

    • SHA1

      3d669fabb05229f6f548580a1068196fd39d5a89

    • SHA256

      138b12a61b355225f3f58e24129be621df2f25bd956282d0863d688102924c86

    • SHA512

      f9a8643e844b7be561a3d0dd516d57d2702e57cfd784289a3943e642b470e6406fed0b5e4bbd3d804e27befdd2144fba8887e0703b70c3e0a6419e2bf9fe069f

    • SSDEEP

      24576:oyrQ8SDb5zg4FkaASxyZY+e9ceTSIm7mDlj41LaT9ftxb4U8:vrQ8SDb5U4FkaDxyZY+PuSP7mDl0wpfJ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks