General

  • Target

    6a3a0c7ebdf8b2c659cf22da296c4a8121e64123abc4f8383f2e6cccfe5c942e

  • Size

    772KB

  • Sample

    241111-czb7aa1ajq

  • MD5

    723c46731434889ebf4131fc644b3a60

  • SHA1

    47388a744e6c70213e53eab5a62cac414924f48f

  • SHA256

    6a3a0c7ebdf8b2c659cf22da296c4a8121e64123abc4f8383f2e6cccfe5c942e

  • SHA512

    1a3859b3e57dc41bdcda37a9a04fb6601e287b0e92c8d733ecd5aeda7bb24ef0b69572f920a657d0ab44d93a65003f21baf54fca98094a29e014ce716c79fc17

  • SSDEEP

    24576:2yd7+PVlmm3JEvfqI7CerqbdTjNOPpiJOYb:FdiPSM6bqdTpOPpiv

Malware Config

Extracted

Family

redline

Botnet

misik

C2

217.196.96.102:4132

Attributes
  • auth_value

    9133827666bc8f4b05339316460b08aa

Targets

    • Target

      6a3a0c7ebdf8b2c659cf22da296c4a8121e64123abc4f8383f2e6cccfe5c942e

    • Size

      772KB

    • MD5

      723c46731434889ebf4131fc644b3a60

    • SHA1

      47388a744e6c70213e53eab5a62cac414924f48f

    • SHA256

      6a3a0c7ebdf8b2c659cf22da296c4a8121e64123abc4f8383f2e6cccfe5c942e

    • SHA512

      1a3859b3e57dc41bdcda37a9a04fb6601e287b0e92c8d733ecd5aeda7bb24ef0b69572f920a657d0ab44d93a65003f21baf54fca98094a29e014ce716c79fc17

    • SSDEEP

      24576:2yd7+PVlmm3JEvfqI7CerqbdTjNOPpiJOYb:FdiPSM6bqdTpOPpiv

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks