General

  • Target

    a4083dd023bbbc26037172742341bd9360c6fa518b6920818d547129e5347e81N.exe

  • Size

    530KB

  • Sample

    241110-3rxq5a1jhr

  • MD5

    ec0298609957a7d09b8d5c70e242bb31

  • SHA1

    6bc4c66e43eac0dcae2285d802b645375620fc7f

  • SHA256

    8ee5b6e133d96f344af99ec9d3d016cdf8bbe889ac1b5d666eacc4ca1223ab8e

  • SHA512

    ddd304adf22e4b4251908603ba271314d916f138bcd857480c0844a293f8423cda48297d9a4b1c1676b2fc01270b5d297f13d510cc4c7b62f997fa0e7653fe0d

  • SSDEEP

    12288:cGttPn9arXxRkAdaP1WiZsCQrpNapD8KoL:xJuXxRJdaP1WiZsCQzKoL

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Targets

    • Target

      a4083dd023bbbc26037172742341bd9360c6fa518b6920818d547129e5347e81N.exe

    • Size

      530KB

    • MD5

      ec0298609957a7d09b8d5c70e242bb31

    • SHA1

      6bc4c66e43eac0dcae2285d802b645375620fc7f

    • SHA256

      8ee5b6e133d96f344af99ec9d3d016cdf8bbe889ac1b5d666eacc4ca1223ab8e

    • SHA512

      ddd304adf22e4b4251908603ba271314d916f138bcd857480c0844a293f8423cda48297d9a4b1c1676b2fc01270b5d297f13d510cc4c7b62f997fa0e7653fe0d

    • SSDEEP

      12288:cGttPn9arXxRkAdaP1WiZsCQrpNapD8KoL:xJuXxRJdaP1WiZsCQzKoL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks