General

  • Target

    430098ac4c3d5041a8a2f7ff151a148db61f07eccac7f2f640386574ac4f57c2

  • Size

    1.1MB

  • Sample

    241110-vhe6qatqhl

  • MD5

    049e24379b92f63ee3b12ab3e4a97237

  • SHA1

    60118ab476ad60139f5c4d282609e041a7528121

  • SHA256

    430098ac4c3d5041a8a2f7ff151a148db61f07eccac7f2f640386574ac4f57c2

  • SHA512

    aae41e4d3bc957e543d4013b35cb1ca66a11191c52a3985482450819a561989f7956fc8cea8648b77d827c0ddadeaccd62eb75f67e01ea71360925257929d778

  • SSDEEP

    24576:3ykAw+oiEcgHcpFkH/jva74B1x7Q53Ltom9Fs+d:C6t1HcpFkH7q4B1xQ9L79O+

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      430098ac4c3d5041a8a2f7ff151a148db61f07eccac7f2f640386574ac4f57c2

    • Size

      1.1MB

    • MD5

      049e24379b92f63ee3b12ab3e4a97237

    • SHA1

      60118ab476ad60139f5c4d282609e041a7528121

    • SHA256

      430098ac4c3d5041a8a2f7ff151a148db61f07eccac7f2f640386574ac4f57c2

    • SHA512

      aae41e4d3bc957e543d4013b35cb1ca66a11191c52a3985482450819a561989f7956fc8cea8648b77d827c0ddadeaccd62eb75f67e01ea71360925257929d778

    • SSDEEP

      24576:3ykAw+oiEcgHcpFkH/jva74B1x7Q53Ltom9Fs+d:C6t1HcpFkH7q4B1xQ9L79O+

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks