General

  • Target

    ddb8175d303ed2d36480b9cd0e23b28c5afd5ecc8a8950ae8c453c20668c2bef

  • Size

    891KB

  • Sample

    230507-je2d1aef29

  • MD5

    6a02ee6def7faffa88444d2cb0173ec6

  • SHA1

    45afe19afc920cb25fe4dbb4464368007a0c0bc0

  • SHA256

    ddb8175d303ed2d36480b9cd0e23b28c5afd5ecc8a8950ae8c453c20668c2bef

  • SHA512

    c4c209c4a8a0ef872ae3b26dfe9e8fd593c8cef35c51edd0721ec9252ad0cc4e4f76e2339bbe6b246ba4792ab09a54664a8bf689b24cd6199f5acb2a27ce1862

  • SSDEEP

    24576:LyUR2V6nyhI8PJnaPwMihsCQH96ZRsKrP91CQg+hFY:+UIVeyh/PJaPwMYJdZm8l1jF

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dork

C2

185.161.248.73:4164

Attributes
  • auth_value

    e81be7d6cfb453cc812e1b4890eeadad

Targets

    • Target

      ddb8175d303ed2d36480b9cd0e23b28c5afd5ecc8a8950ae8c453c20668c2bef

    • Size

      891KB

    • MD5

      6a02ee6def7faffa88444d2cb0173ec6

    • SHA1

      45afe19afc920cb25fe4dbb4464368007a0c0bc0

    • SHA256

      ddb8175d303ed2d36480b9cd0e23b28c5afd5ecc8a8950ae8c453c20668c2bef

    • SHA512

      c4c209c4a8a0ef872ae3b26dfe9e8fd593c8cef35c51edd0721ec9252ad0cc4e4f76e2339bbe6b246ba4792ab09a54664a8bf689b24cd6199f5acb2a27ce1862

    • SSDEEP

      24576:LyUR2V6nyhI8PJnaPwMihsCQH96ZRsKrP91CQg+hFY:+UIVeyh/PJaPwMYJdZm8l1jF

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks