General

  • Target

    d2cfd151e051e4cb827cb1e92c009ca1cb00fb20db1abe333dd2b0461e2e297eN.exe

  • Size

    488KB

  • Sample

    241205-ftprzawmdp

  • MD5

    d0dc86ac5f753c9420f47ae68a157140

  • SHA1

    34278187e6a86598e95afee09d791d44de05b34e

  • SHA256

    d2cfd151e051e4cb827cb1e92c009ca1cb00fb20db1abe333dd2b0461e2e297e

  • SHA512

    7b88310526700772ebd838b4ca9c917a6835ac4720c0018ab867ca4344038133f4959567956e698aa4511f46fc303670ee0de27b1bc956300b100c6fa2b7689e

  • SSDEEP

    6144:KIy+bnr+Rp0yN90QEfP15epEzSHBjkZ8fEg06yZV+Bi89Xl5ARAX32jb/OdQzLVO:4Mrxy90L0H1nEgxyZI/1l5qDH3HVcG4

Malware Config

Extracted

Family

redline

Botnet

misik

C2

217.196.96.102:4132

Attributes
  • auth_value

    9133827666bc8f4b05339316460b08aa

Targets

    • Target

      d2cfd151e051e4cb827cb1e92c009ca1cb00fb20db1abe333dd2b0461e2e297eN.exe

    • Size

      488KB

    • MD5

      d0dc86ac5f753c9420f47ae68a157140

    • SHA1

      34278187e6a86598e95afee09d791d44de05b34e

    • SHA256

      d2cfd151e051e4cb827cb1e92c009ca1cb00fb20db1abe333dd2b0461e2e297e

    • SHA512

      7b88310526700772ebd838b4ca9c917a6835ac4720c0018ab867ca4344038133f4959567956e698aa4511f46fc303670ee0de27b1bc956300b100c6fa2b7689e

    • SSDEEP

      6144:KIy+bnr+Rp0yN90QEfP15epEzSHBjkZ8fEg06yZV+Bi89Xl5ARAX32jb/OdQzLVO:4Mrxy90L0H1nEgxyZI/1l5qDH3HVcG4

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks