General

  • Target

    de63ab7c1610f8085d6508fbcd575e7ab57a0b6f532291907685daa57f129b36

  • Size

    1.1MB

  • Sample

    241111-f4ls3axlen

  • MD5

    ff7ebc1e4250b7da855be44ad02f5d28

  • SHA1

    155f6166eb20e83ff851368bf95b61a863b90ef6

  • SHA256

    de63ab7c1610f8085d6508fbcd575e7ab57a0b6f532291907685daa57f129b36

  • SHA512

    60a2e50e2406dd822c6f0bcd280de62375759c48e045d98f1142df07c28f8634a76638bb756ac10a51460a5eddf39580f1dec7b4ce92348953620ffac80d1df5

  • SSDEEP

    24576:fyMLySErBR9oFkdwH5TxM/P5qvXLZ5lLj3NbVn6:q31R9oFkQi5Gjl33NbVn

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      de63ab7c1610f8085d6508fbcd575e7ab57a0b6f532291907685daa57f129b36

    • Size

      1.1MB

    • MD5

      ff7ebc1e4250b7da855be44ad02f5d28

    • SHA1

      155f6166eb20e83ff851368bf95b61a863b90ef6

    • SHA256

      de63ab7c1610f8085d6508fbcd575e7ab57a0b6f532291907685daa57f129b36

    • SHA512

      60a2e50e2406dd822c6f0bcd280de62375759c48e045d98f1142df07c28f8634a76638bb756ac10a51460a5eddf39580f1dec7b4ce92348953620ffac80d1df5

    • SSDEEP

      24576:fyMLySErBR9oFkdwH5TxM/P5qvXLZ5lLj3NbVn6:q31R9oFkQi5Gjl33NbVn

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks