General

  • Target

    13a349a670d1efad9350ee678516c44a7b0e328673bbb7451b68c228c9420fcc

  • Size

    774KB

  • Sample

    241110-12xsrswhpg

  • MD5

    32c6f1cfab26ae8ba81e77e7c15ad180

  • SHA1

    4f1b5e5935814505153a153fbb2171b88084717c

  • SHA256

    13a349a670d1efad9350ee678516c44a7b0e328673bbb7451b68c228c9420fcc

  • SHA512

    9abc763e62c29ad99ae4854004f80ec37231f008cd186188dc229b6ec447d04944b3b4dc90116061473cad03f8e2290f486f822e228f0c1d5a365f7e7da2cae4

  • SSDEEP

    12288:qy90keWi1pyBui0Yud9lVCUzXJw27Mi00bXhv14T8NTiNZJdbWBFuq:qyMWmUBGLzzZP7FX/4TqiNdUt

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

danko

C2

185.161.248.73:4164

Attributes
  • auth_value

    784d42a6c1eb1a5060b8bcd3696f5f1e

Targets

    • Target

      13a349a670d1efad9350ee678516c44a7b0e328673bbb7451b68c228c9420fcc

    • Size

      774KB

    • MD5

      32c6f1cfab26ae8ba81e77e7c15ad180

    • SHA1

      4f1b5e5935814505153a153fbb2171b88084717c

    • SHA256

      13a349a670d1efad9350ee678516c44a7b0e328673bbb7451b68c228c9420fcc

    • SHA512

      9abc763e62c29ad99ae4854004f80ec37231f008cd186188dc229b6ec447d04944b3b4dc90116061473cad03f8e2290f486f822e228f0c1d5a365f7e7da2cae4

    • SSDEEP

      12288:qy90keWi1pyBui0Yud9lVCUzXJw27Mi00bXhv14T8NTiNZJdbWBFuq:qyMWmUBGLzzZP7FX/4TqiNdUt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks