General

  • Target

    29e6811275f0a6bf0ae696f9ec86021eb0d10cf9dbba185d17d8d7fcfb3edb39.exe

  • Size

    1.3MB

  • Sample

    241110-141bnszkej

  • MD5

    45b511b0ac927f306dac672ebff50ef2

  • SHA1

    fa802a0fc8289b3a1533ccb6d6804366f9efb058

  • SHA256

    29e6811275f0a6bf0ae696f9ec86021eb0d10cf9dbba185d17d8d7fcfb3edb39

  • SHA512

    ef3766c7c312315bc64ea85d297bb5a5a46e8a470f9b8d790031ec869b68e5c62f7fe383314c404f220301af9c2b0427c3f291340286cb5b3a3fbffeef1a524e

  • SSDEEP

    24576:kysPQeTK7Ge1Cwc5gwOgx6YYR30MXEtV23yV65brPlU48:zo3kCwc5EYYRXUMXbrCv

Malware Config

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Targets

    • Target

      29e6811275f0a6bf0ae696f9ec86021eb0d10cf9dbba185d17d8d7fcfb3edb39.exe

    • Size

      1.3MB

    • MD5

      45b511b0ac927f306dac672ebff50ef2

    • SHA1

      fa802a0fc8289b3a1533ccb6d6804366f9efb058

    • SHA256

      29e6811275f0a6bf0ae696f9ec86021eb0d10cf9dbba185d17d8d7fcfb3edb39

    • SHA512

      ef3766c7c312315bc64ea85d297bb5a5a46e8a470f9b8d790031ec869b68e5c62f7fe383314c404f220301af9c2b0427c3f291340286cb5b3a3fbffeef1a524e

    • SSDEEP

      24576:kysPQeTK7Ge1Cwc5gwOgx6YYR30MXEtV23yV65brPlU48:zo3kCwc5EYYRXUMXbrCv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks