General

  • Target

    a8931f96e096b1943da5c29728e3aa6fbff60b3330246b59e1e7e026c6687cbbN.exe

  • Size

    415KB

  • Sample

    241110-2x8vxaxbkm

  • MD5

    c249b0a93f7bba2f3a49c644e98f09f6

  • SHA1

    0bf1e8bf1a10d2b10761df2084660bc1637bc2ca

  • SHA256

    a9635dcb9adf2fcbf547a4d35a9d8f6a6daedce4a791925e72a0fe4e04f4a40a

  • SHA512

    044f74797888d8011fa626a250ecdcfdcff067b79aa4f773dcc93c97e0c9fc71cb4ea6212fc011dfb3658ae6840fb8ee89a6d41d09654599e9e8de6b5b25a00a

  • SSDEEP

    6144:cWa1OEXyUoC1RkhRAdv7weEZ3FpTo3Gt3q7Z+r8vkDHz9APLcLYo6aMzyFs30TP:cWt/UoMiVB3FpgGVqcr8voO8P

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Targets

    • Target

      a8931f96e096b1943da5c29728e3aa6fbff60b3330246b59e1e7e026c6687cbbN.exe

    • Size

      415KB

    • MD5

      c249b0a93f7bba2f3a49c644e98f09f6

    • SHA1

      0bf1e8bf1a10d2b10761df2084660bc1637bc2ca

    • SHA256

      a9635dcb9adf2fcbf547a4d35a9d8f6a6daedce4a791925e72a0fe4e04f4a40a

    • SHA512

      044f74797888d8011fa626a250ecdcfdcff067b79aa4f773dcc93c97e0c9fc71cb4ea6212fc011dfb3658ae6840fb8ee89a6d41d09654599e9e8de6b5b25a00a

    • SSDEEP

      6144:cWa1OEXyUoC1RkhRAdv7weEZ3FpTo3Gt3q7Z+r8vkDHz9APLcLYo6aMzyFs30TP:cWt/UoMiVB3FpgGVqcr8voO8P

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks