General

  • Target

    53b61bf5fbf118038cb96e8d46bbe2e9561d9142a533603dce8a7c559fd1b21fN.exe

  • Size

    316KB

  • Sample

    241122-l9bsyavldq

  • MD5

    e9a8169fb6c6a67bba67c5b992f58a30

  • SHA1

    f536e6e1a6461a61e9f533863baf0fde51c6b5e2

  • SHA256

    53b61bf5fbf118038cb96e8d46bbe2e9561d9142a533603dce8a7c559fd1b21f

  • SHA512

    f0c0d04202e2079f9681c5303ce1b70d1e5fd9b3ff41fff9f251bd1db73341498c5868a8210484bf581645ec150480129bdd2e29ff39cf06f7ec0b86301b698a

  • SSDEEP

    6144:Kdy+bnr+Op0yN90QE76vZrMgXGm9O5VaHJnQKJC0H6UznVCXvs+:PMriy90xmNGHapQKJC0aUcfH

Malware Config

Extracted

Family

redline

Botnet

dubur

C2

217.196.96.102:4132

Attributes
  • auth_value

    32d04179aa1e8d655d2d80c21f99de41

Targets

    • Target

      53b61bf5fbf118038cb96e8d46bbe2e9561d9142a533603dce8a7c559fd1b21fN.exe

    • Size

      316KB

    • MD5

      e9a8169fb6c6a67bba67c5b992f58a30

    • SHA1

      f536e6e1a6461a61e9f533863baf0fde51c6b5e2

    • SHA256

      53b61bf5fbf118038cb96e8d46bbe2e9561d9142a533603dce8a7c559fd1b21f

    • SHA512

      f0c0d04202e2079f9681c5303ce1b70d1e5fd9b3ff41fff9f251bd1db73341498c5868a8210484bf581645ec150480129bdd2e29ff39cf06f7ec0b86301b698a

    • SSDEEP

      6144:Kdy+bnr+Op0yN90QE76vZrMgXGm9O5VaHJnQKJC0H6UznVCXvs+:PMriy90xmNGHapQKJC0aUcfH

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks