General

  • Target

    6ddf62e2bdbdc9ceb306a448b8859259a969a2f509e982eb319b41184e4206e8

  • Size

    793KB

  • Sample

    241109-ppaxpavapj

  • MD5

    7c95c7d49f4d5b1d97ab09e2336fce72

  • SHA1

    82fb64fecca045b38bee29c340f674338e90e983

  • SHA256

    6ddf62e2bdbdc9ceb306a448b8859259a969a2f509e982eb319b41184e4206e8

  • SHA512

    ffc28bc309b71c95527db166149dd29a160040ddcb402733124987024d212e999bcd68f7abc0c4012e2c2f04284015ffb66e0c883345b1b7a5ecef56fc21eec9

  • SSDEEP

    12288:qy90FvgBt+2dfZ9GeYTW3QaTSUNAFBYsTGU56p3peBQ6zJ6iVbOZG0VfoTbXS:qyug7XdfeSQUOp7zJ6iVbP0VfoTLS

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Targets

    • Target

      6ddf62e2bdbdc9ceb306a448b8859259a969a2f509e982eb319b41184e4206e8

    • Size

      793KB

    • MD5

      7c95c7d49f4d5b1d97ab09e2336fce72

    • SHA1

      82fb64fecca045b38bee29c340f674338e90e983

    • SHA256

      6ddf62e2bdbdc9ceb306a448b8859259a969a2f509e982eb319b41184e4206e8

    • SHA512

      ffc28bc309b71c95527db166149dd29a160040ddcb402733124987024d212e999bcd68f7abc0c4012e2c2f04284015ffb66e0c883345b1b7a5ecef56fc21eec9

    • SSDEEP

      12288:qy90FvgBt+2dfZ9GeYTW3QaTSUNAFBYsTGU56p3peBQ6zJ6iVbOZG0VfoTbXS:qyug7XdfeSQUOp7zJ6iVbP0VfoTLS

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks