General

  • Target

    48462423d033cd4c36d47fe45adb6030605ce27f6cdf6226487472fa548fbd9b

  • Size

    769KB

  • Sample

    241110-zz4b4awakc

  • MD5

    e31e2b619f14b96fbeca5c0379abc3c7

  • SHA1

    d733a8e43e84f4b73bc281a4d58cc8bafa14e6a5

  • SHA256

    48462423d033cd4c36d47fe45adb6030605ce27f6cdf6226487472fa548fbd9b

  • SHA512

    77d68d96d98e792f20b36270e3c13992839668cba8050a049d84cc5944848f5495bf5fee962ba7c4c16816d68963c8555b1c43cea59b6e690df6fa8fa81518d1

  • SSDEEP

    24576:LyCwcZpKnW7cEKm53VKxnCF+VUXJran6aMd:+uZpKnW7+EKxnCFxJrDh

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.75:4132

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Targets

    • Target

      48462423d033cd4c36d47fe45adb6030605ce27f6cdf6226487472fa548fbd9b

    • Size

      769KB

    • MD5

      e31e2b619f14b96fbeca5c0379abc3c7

    • SHA1

      d733a8e43e84f4b73bc281a4d58cc8bafa14e6a5

    • SHA256

      48462423d033cd4c36d47fe45adb6030605ce27f6cdf6226487472fa548fbd9b

    • SHA512

      77d68d96d98e792f20b36270e3c13992839668cba8050a049d84cc5944848f5495bf5fee962ba7c4c16816d68963c8555b1c43cea59b6e690df6fa8fa81518d1

    • SSDEEP

      24576:LyCwcZpKnW7cEKm53VKxnCF+VUXJran6aMd:+uZpKnW7+EKxnCFxJrDh

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks