General

  • Target

    5209e0928abab78f7dc61868d4f9f463a60fa807a8efc80684af750d56d60e81

  • Size

    866KB

  • Sample

    241110-3v4zlsxkg1

  • MD5

    95a72c86dac85184b7ec9b17369c4d09

  • SHA1

    e263e17388b3b21a4a6df9dbd4129aadf5e6cc4c

  • SHA256

    5209e0928abab78f7dc61868d4f9f463a60fa807a8efc80684af750d56d60e81

  • SHA512

    c7f4c933a99d2e4ab7766c2f66c23f7a52858bd27c6db784180b1e18d6d15de3795b267920234c202f67ed15dd83e1eb2e9b9b045128894c60139f7ccdfbc9d5

  • SSDEEP

    24576:/yp9IAwwxXInndgJbRc9rhFS3rKubmaqdMDfW4FAuS:Kp+ZO6CRU45fqObWQN

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Targets

    • Target

      5209e0928abab78f7dc61868d4f9f463a60fa807a8efc80684af750d56d60e81

    • Size

      866KB

    • MD5

      95a72c86dac85184b7ec9b17369c4d09

    • SHA1

      e263e17388b3b21a4a6df9dbd4129aadf5e6cc4c

    • SHA256

      5209e0928abab78f7dc61868d4f9f463a60fa807a8efc80684af750d56d60e81

    • SHA512

      c7f4c933a99d2e4ab7766c2f66c23f7a52858bd27c6db784180b1e18d6d15de3795b267920234c202f67ed15dd83e1eb2e9b9b045128894c60139f7ccdfbc9d5

    • SSDEEP

      24576:/yp9IAwwxXInndgJbRc9rhFS3rKubmaqdMDfW4FAuS:Kp+ZO6CRU45fqObWQN

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks