General

  • Target

    c551a44b8006f79fc9e974a653618cc29408cb2da20f06b9477b1d44665bc8de.exe

  • Size

    770KB

  • Sample

    241203-wp4ckasmcl

  • MD5

    f712ba8c4457a7b1f5b75b9eb66023a0

  • SHA1

    4201554d45faab946cff8b5327d5b8491ef31cad

  • SHA256

    c551a44b8006f79fc9e974a653618cc29408cb2da20f06b9477b1d44665bc8de

  • SHA512

    112d97aebe90d4080df2f0a92785a342609a473b708e5ab8e3fc4e3dadab014e59d4b87ba0531678d11e495a914059d1c60a914c854e565f863da9e483dddc82

  • SSDEEP

    24576:2ySrK08SNLXZRMlDVM0cWzor+s0muZ3Vv:FP0fNLpiV5XzoKsduZ3Z

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.75:4132

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Targets

    • Target

      c551a44b8006f79fc9e974a653618cc29408cb2da20f06b9477b1d44665bc8de.exe

    • Size

      770KB

    • MD5

      f712ba8c4457a7b1f5b75b9eb66023a0

    • SHA1

      4201554d45faab946cff8b5327d5b8491ef31cad

    • SHA256

      c551a44b8006f79fc9e974a653618cc29408cb2da20f06b9477b1d44665bc8de

    • SHA512

      112d97aebe90d4080df2f0a92785a342609a473b708e5ab8e3fc4e3dadab014e59d4b87ba0531678d11e495a914059d1c60a914c854e565f863da9e483dddc82

    • SSDEEP

      24576:2ySrK08SNLXZRMlDVM0cWzor+s0muZ3Vv:FP0fNLpiV5XzoKsduZ3Z

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks