General

  • Target

    3e21b24b5d323d15e2d70724fd6174ec36bad6496816ce3bb0a3d5233d79ab57.bin

  • Size

    1.2MB

  • Sample

    230506-1b4tdsgb92

  • MD5

    758c5b05b8e597367142da759db50321

  • SHA1

    bf4b8f5f89027807c2f0df8a96f05542665a76d9

  • SHA256

    3e21b24b5d323d15e2d70724fd6174ec36bad6496816ce3bb0a3d5233d79ab57

  • SHA512

    51be9af954146664b45cb27454b60eaef460fc4b0a5c2f7b9c5f30fa0f67a1a29ecd0bf1870ad83bed2c34cafa20071d317606e84c49870549eae944fcc83fdf

  • SSDEEP

    24576:0youzBhnOtdRUUqgfPMGbPpX1OCEv0+fB1c5TkOa+8OWAXTHq8UT:DoIhnOtkU7PjbhX1OCEvzfOn8OWADH7U

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Targets

    • Target

      3e21b24b5d323d15e2d70724fd6174ec36bad6496816ce3bb0a3d5233d79ab57.bin

    • Size

      1.2MB

    • MD5

      758c5b05b8e597367142da759db50321

    • SHA1

      bf4b8f5f89027807c2f0df8a96f05542665a76d9

    • SHA256

      3e21b24b5d323d15e2d70724fd6174ec36bad6496816ce3bb0a3d5233d79ab57

    • SHA512

      51be9af954146664b45cb27454b60eaef460fc4b0a5c2f7b9c5f30fa0f67a1a29ecd0bf1870ad83bed2c34cafa20071d317606e84c49870549eae944fcc83fdf

    • SSDEEP

      24576:0youzBhnOtdRUUqgfPMGbPpX1OCEv0+fB1c5TkOa+8OWAXTHq8UT:DoIhnOtkU7PjbhX1OCEvzfOn8OWADH7U

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks