General

  • Target

    b5e7eebe80e0f986a50e3a63872d5abb0338a1d08e3bd0ceea7c252dc4384ea2

  • Size

    770KB

  • Sample

    241111-cqpq1szfrr

  • MD5

    201a26f05697f3523efd6d871b65601d

  • SHA1

    c2e289166082fda4ca780fdcffbf7e6dcb169cd8

  • SHA256

    b5e7eebe80e0f986a50e3a63872d5abb0338a1d08e3bd0ceea7c252dc4384ea2

  • SHA512

    d694e6d10f3354781230766fa0d081dd954981c95b6b31afef9b6c11b1f4b3d46b72203bb91ba7d4c4e3a99d49ffdb3cc2aacd98df9cca49cc08d0f42be365bd

  • SSDEEP

    12288:HMrMy90E+mezIh3d52auzb3yWnpPaiqWINSTRJLbgzA:nyB/e+eamby0CiSNSTx

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.75:4132

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Targets

    • Target

      b5e7eebe80e0f986a50e3a63872d5abb0338a1d08e3bd0ceea7c252dc4384ea2

    • Size

      770KB

    • MD5

      201a26f05697f3523efd6d871b65601d

    • SHA1

      c2e289166082fda4ca780fdcffbf7e6dcb169cd8

    • SHA256

      b5e7eebe80e0f986a50e3a63872d5abb0338a1d08e3bd0ceea7c252dc4384ea2

    • SHA512

      d694e6d10f3354781230766fa0d081dd954981c95b6b31afef9b6c11b1f4b3d46b72203bb91ba7d4c4e3a99d49ffdb3cc2aacd98df9cca49cc08d0f42be365bd

    • SSDEEP

      12288:HMrMy90E+mezIh3d52auzb3yWnpPaiqWINSTRJLbgzA:nyB/e+eamby0CiSNSTx

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks