General

  • Target

    af17367fbcda1f30a6deac6bacfa73f612a4c118994b8ab9ff1e170245fcf00f

  • Size

    894KB

  • Sample

    241109-eqcskaznaq

  • MD5

    b52f3f5466708b4ea5af9d195bac123e

  • SHA1

    1fb70805b5f4c2ddce9d5704b72fdc4f91b64a13

  • SHA256

    af17367fbcda1f30a6deac6bacfa73f612a4c118994b8ab9ff1e170245fcf00f

  • SHA512

    02e2fdbaeb746493aeb10b4849d72fed2edef9736ffece84c7c6fbdc24f6b533f9bd353c607dfe0a9be805535441e7174f1afea09b4f50b72d17d220932867d0

  • SSDEEP

    24576:TydDR7QXOaLnZRyfUSE57ZxjB/2YYdMT7Pyq1xJHB4:mdDR7PaLZW2ZLeYYdMT7yoJHB

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Targets

    • Target

      af17367fbcda1f30a6deac6bacfa73f612a4c118994b8ab9ff1e170245fcf00f

    • Size

      894KB

    • MD5

      b52f3f5466708b4ea5af9d195bac123e

    • SHA1

      1fb70805b5f4c2ddce9d5704b72fdc4f91b64a13

    • SHA256

      af17367fbcda1f30a6deac6bacfa73f612a4c118994b8ab9ff1e170245fcf00f

    • SHA512

      02e2fdbaeb746493aeb10b4849d72fed2edef9736ffece84c7c6fbdc24f6b533f9bd353c607dfe0a9be805535441e7174f1afea09b4f50b72d17d220932867d0

    • SSDEEP

      24576:TydDR7QXOaLnZRyfUSE57ZxjB/2YYdMT7Pyq1xJHB4:mdDR7PaLZW2ZLeYYdMT7yoJHB

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks