General

  • Target

    9ec24cdf39f46a97413adc307bbfc3a1983a27ec755c861a9308ea2bdcd8bc87

  • Size

    793KB

  • Sample

    241109-feey8axhmc

  • MD5

    d5cccb10fa9e3c7f2d41dbabdb159416

  • SHA1

    4b95ba83a7ca3d13420596bed6d664508c7adcc3

  • SHA256

    9ec24cdf39f46a97413adc307bbfc3a1983a27ec755c861a9308ea2bdcd8bc87

  • SHA512

    5c9d83d533c8683cef452f3e69ea40b9774939aa49d60939f0328a790a30f5682412df46ed6ebb1d5b9479cff18c1782701d4443604fb7d18704e3e280447e3a

  • SSDEEP

    12288:Gy90f7ZOyBnmEFnn2pVGR5VwnoPXVAneNbDVCouHEIIeV7McTpusoFRKz:GyOb1JFntRYnovVf9v9IhV7LTIKz

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Targets

    • Target

      9ec24cdf39f46a97413adc307bbfc3a1983a27ec755c861a9308ea2bdcd8bc87

    • Size

      793KB

    • MD5

      d5cccb10fa9e3c7f2d41dbabdb159416

    • SHA1

      4b95ba83a7ca3d13420596bed6d664508c7adcc3

    • SHA256

      9ec24cdf39f46a97413adc307bbfc3a1983a27ec755c861a9308ea2bdcd8bc87

    • SHA512

      5c9d83d533c8683cef452f3e69ea40b9774939aa49d60939f0328a790a30f5682412df46ed6ebb1d5b9479cff18c1782701d4443604fb7d18704e3e280447e3a

    • SSDEEP

      12288:Gy90f7ZOyBnmEFnn2pVGR5VwnoPXVAneNbDVCouHEIIeV7McTpusoFRKz:GyOb1JFntRYnovVf9v9IhV7LTIKz

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks