General

  • Target

    aad674ee7cb1795ac4e338b39a564fa0de8b080fa9312f18e77ecd5d79b10902

  • Size

    774KB

  • Sample

    241109-qzt9ravjgt

  • MD5

    9c6685cde5c9fb41a71275efb3815a3a

  • SHA1

    854be14ec473807518ee0ecd397b02320167702a

  • SHA256

    aad674ee7cb1795ac4e338b39a564fa0de8b080fa9312f18e77ecd5d79b10902

  • SHA512

    c42cf077e510828dbb124eb5266c70a9b76996cd9cdc33f60369316b1904c4f763e8958cedc8d8f59da5f3c6833f7f09e1e87333f4f3e191ba0a3dcb8642a8d9

  • SSDEEP

    24576:wy++WqfKt0SSNSo5G98kahDfxF/xOHYffR:3P3SAM989hLz/EYf

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Targets

    • Target

      aad674ee7cb1795ac4e338b39a564fa0de8b080fa9312f18e77ecd5d79b10902

    • Size

      774KB

    • MD5

      9c6685cde5c9fb41a71275efb3815a3a

    • SHA1

      854be14ec473807518ee0ecd397b02320167702a

    • SHA256

      aad674ee7cb1795ac4e338b39a564fa0de8b080fa9312f18e77ecd5d79b10902

    • SHA512

      c42cf077e510828dbb124eb5266c70a9b76996cd9cdc33f60369316b1904c4f763e8958cedc8d8f59da5f3c6833f7f09e1e87333f4f3e191ba0a3dcb8642a8d9

    • SSDEEP

      24576:wy++WqfKt0SSNSo5G98kahDfxF/xOHYffR:3P3SAM989hLz/EYf

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks