General

  • Target

    f454fed6d4d59b8e4829f6b1cda6223cf24cee3653dfebae2536ee5d0259bc8b

  • Size

    793KB

  • Sample

    241110-bfzmssypcq

  • MD5

    8e3fbfe9a921224e88cf529afd59494a

  • SHA1

    12abf8bd165ca843fde6fbe8adb344a7d1a19a7b

  • SHA256

    f454fed6d4d59b8e4829f6b1cda6223cf24cee3653dfebae2536ee5d0259bc8b

  • SHA512

    680b7473ea60cccd9268fc81918ede980281e663b26643089949dbce807e9bccab8129fccc36beedaaf550f8c6dd998d495ac5fe9945236f4d6422715f7ebe67

  • SSDEEP

    24576:hyG1tRECsnZRrROXkAmfiHjOMVr/eTCNloQ:UG1UCsZTyheT

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Targets

    • Target

      f454fed6d4d59b8e4829f6b1cda6223cf24cee3653dfebae2536ee5d0259bc8b

    • Size

      793KB

    • MD5

      8e3fbfe9a921224e88cf529afd59494a

    • SHA1

      12abf8bd165ca843fde6fbe8adb344a7d1a19a7b

    • SHA256

      f454fed6d4d59b8e4829f6b1cda6223cf24cee3653dfebae2536ee5d0259bc8b

    • SHA512

      680b7473ea60cccd9268fc81918ede980281e663b26643089949dbce807e9bccab8129fccc36beedaaf550f8c6dd998d495ac5fe9945236f4d6422715f7ebe67

    • SSDEEP

      24576:hyG1tRECsnZRrROXkAmfiHjOMVr/eTCNloQ:UG1UCsZTyheT

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks