General

  • Target

    cc043bc197e633e43e17152ecb421c143e61bc0eec6095a20cff29c8b78f9502

  • Size

    896KB

  • Sample

    241109-h1eaxszfnd

  • MD5

    2b88113dc9157f33202752cf1b91a382

  • SHA1

    8dceca1df9ff88eb282a85217f4a27e3c5256735

  • SHA256

    cc043bc197e633e43e17152ecb421c143e61bc0eec6095a20cff29c8b78f9502

  • SHA512

    c84e8d00ff585fd808404eff713fab1a76f75f19b27350cb279881076d53d15f19fcff92c8130c2617f7bf5cd5e5eb345d297cf1af21b5f2838c3c042d7d9018

  • SSDEEP

    24576:byvqVP7XdddnhRda7LhEpj0ak14uC/wrfX7+3:OQRddhOAjPkGSy

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Targets

    • Target

      cc043bc197e633e43e17152ecb421c143e61bc0eec6095a20cff29c8b78f9502

    • Size

      896KB

    • MD5

      2b88113dc9157f33202752cf1b91a382

    • SHA1

      8dceca1df9ff88eb282a85217f4a27e3c5256735

    • SHA256

      cc043bc197e633e43e17152ecb421c143e61bc0eec6095a20cff29c8b78f9502

    • SHA512

      c84e8d00ff585fd808404eff713fab1a76f75f19b27350cb279881076d53d15f19fcff92c8130c2617f7bf5cd5e5eb345d297cf1af21b5f2838c3c042d7d9018

    • SSDEEP

      24576:byvqVP7XdddnhRda7LhEpj0ak14uC/wrfX7+3:OQRddhOAjPkGSy

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks