General

  • Target

    3f0e3605dace186bc1d64852888fadad95a0748fd6cccd82e19c0e2fed57e393

  • Size

    1.1MB

  • Sample

    241111-c1r9wstpfj

  • MD5

    af9a6a1b60fabdb413d72279c8508cb1

  • SHA1

    372ae4a3aed493de31f2524e456eacbc9501b213

  • SHA256

    3f0e3605dace186bc1d64852888fadad95a0748fd6cccd82e19c0e2fed57e393

  • SHA512

    01aaa9242fcce304e1005f88b6908136dfed0f782e67964b2d3ffa4353bddde5b992cdc7fa281c203a052669a0fb086afa54441721cebdf1dd9da4958f57eba4

  • SSDEEP

    24576:iyHrwsUBFkBqTPRqlK8LiTISvk1NcZljNMhgVDzI:JL1UBFkBqrRgjLiTISvYWNmcz

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      3f0e3605dace186bc1d64852888fadad95a0748fd6cccd82e19c0e2fed57e393

    • Size

      1.1MB

    • MD5

      af9a6a1b60fabdb413d72279c8508cb1

    • SHA1

      372ae4a3aed493de31f2524e456eacbc9501b213

    • SHA256

      3f0e3605dace186bc1d64852888fadad95a0748fd6cccd82e19c0e2fed57e393

    • SHA512

      01aaa9242fcce304e1005f88b6908136dfed0f782e67964b2d3ffa4353bddde5b992cdc7fa281c203a052669a0fb086afa54441721cebdf1dd9da4958f57eba4

    • SSDEEP

      24576:iyHrwsUBFkBqTPRqlK8LiTISvk1NcZljNMhgVDzI:JL1UBFkBqrRgjLiTISvYWNmcz

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks