General

  • Target

    cf5ecb3b61dcb6916c8da75e083d9968c05b6f897e14cccad49f5b945eeee25c

  • Size

    850KB

  • Sample

    241109-bys8qstlas

  • MD5

    58a98182a18349754f6685acd201056e

  • SHA1

    ddda71980f3b080dced57556b79542d3dd5dc9cf

  • SHA256

    cf5ecb3b61dcb6916c8da75e083d9968c05b6f897e14cccad49f5b945eeee25c

  • SHA512

    0eb9fd9e6232208d55597390d1be69d615c0348d446ad067abcfee67ffc28e0769bdbd9ee3f4bc25449442133be941022545ff10d94ad61eb66f5f93a8f081fd

  • SSDEEP

    12288:uy90N9wVINpbAEaF0uSmmPWSvA6m/7yag4x7KvRbso7NwU+hlyRvG07W2EdATBoW:uykwVIAEaFpSm/So6nXRbZ7MIW2Z3

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Targets

    • Target

      cf5ecb3b61dcb6916c8da75e083d9968c05b6f897e14cccad49f5b945eeee25c

    • Size

      850KB

    • MD5

      58a98182a18349754f6685acd201056e

    • SHA1

      ddda71980f3b080dced57556b79542d3dd5dc9cf

    • SHA256

      cf5ecb3b61dcb6916c8da75e083d9968c05b6f897e14cccad49f5b945eeee25c

    • SHA512

      0eb9fd9e6232208d55597390d1be69d615c0348d446ad067abcfee67ffc28e0769bdbd9ee3f4bc25449442133be941022545ff10d94ad61eb66f5f93a8f081fd

    • SSDEEP

      12288:uy90N9wVINpbAEaF0uSmmPWSvA6m/7yag4x7KvRbso7NwU+hlyRvG07W2EdATBoW:uykwVIAEaFpSm/So6nXRbZ7MIW2Z3

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks