General

  • Target

    91bc1b2fb04e2f8f7f8936c929ceebd6f716812fa1f9f555f309ef05aae1f507

  • Size

    1.1MB

  • Sample

    241111-l8994s1ncn

  • MD5

    bb2e858cc3c31dc52ca942a5778593c0

  • SHA1

    174bd3ce411197b4d3929720e0ba93278dbd4d45

  • SHA256

    91bc1b2fb04e2f8f7f8936c929ceebd6f716812fa1f9f555f309ef05aae1f507

  • SHA512

    56534db4204dfc2d01ff6f0127f7e834b6c49125c4cc7e0e1fbdabaa04a1c6dde0d85ea973b273f73faf9aa56d3d46a09e12bdac2d3c56357d38270052cc9d75

  • SSDEEP

    24576:myW6dec+pbE9g9jLCIc0vsEXtoTmC/u77NvaK8T9Zd:1Hde3VE9g9gI99eGsZ

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      91bc1b2fb04e2f8f7f8936c929ceebd6f716812fa1f9f555f309ef05aae1f507

    • Size

      1.1MB

    • MD5

      bb2e858cc3c31dc52ca942a5778593c0

    • SHA1

      174bd3ce411197b4d3929720e0ba93278dbd4d45

    • SHA256

      91bc1b2fb04e2f8f7f8936c929ceebd6f716812fa1f9f555f309ef05aae1f507

    • SHA512

      56534db4204dfc2d01ff6f0127f7e834b6c49125c4cc7e0e1fbdabaa04a1c6dde0d85ea973b273f73faf9aa56d3d46a09e12bdac2d3c56357d38270052cc9d75

    • SSDEEP

      24576:myW6dec+pbE9g9jLCIc0vsEXtoTmC/u77NvaK8T9Zd:1Hde3VE9g9gI99eGsZ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks