General

  • Target

    8be3b30ccac47b9958a33291ed4213bc8bbbdffb8e26f6313ec4a6ac6f18a744

  • Size

    793KB

  • Sample

    241110-as4lvavlas

  • MD5

    f9c943bb1a496406d4fb4571d799546e

  • SHA1

    640378908048b143e799644556234eb8fb1c553f

  • SHA256

    8be3b30ccac47b9958a33291ed4213bc8bbbdffb8e26f6313ec4a6ac6f18a744

  • SHA512

    766fd23baa6741d1d60013ac2050939d84f88de193cec013002217c8c9d27b2dd1eb7d9a953e24f4f521236550c4441f9bbc18797b011925b6e2f713898d85cb

  • SSDEEP

    24576:zyffxVco0nnhRNXnfZ7rov0q0TTIuYeob:GffxVco0nhrYGl

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Targets

    • Target

      8be3b30ccac47b9958a33291ed4213bc8bbbdffb8e26f6313ec4a6ac6f18a744

    • Size

      793KB

    • MD5

      f9c943bb1a496406d4fb4571d799546e

    • SHA1

      640378908048b143e799644556234eb8fb1c553f

    • SHA256

      8be3b30ccac47b9958a33291ed4213bc8bbbdffb8e26f6313ec4a6ac6f18a744

    • SHA512

      766fd23baa6741d1d60013ac2050939d84f88de193cec013002217c8c9d27b2dd1eb7d9a953e24f4f521236550c4441f9bbc18797b011925b6e2f713898d85cb

    • SSDEEP

      24576:zyffxVco0nnhRNXnfZ7rov0q0TTIuYeob:GffxVco0nhrYGl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks