General

  • Target

    7b4442306f95cae594f78fd43d4c7f051868d00b328d40ee5321b3f11d4e401e

  • Size

    774KB

  • Sample

    241110-gfq9ba1bpk

  • MD5

    49a69cb0f1e7e9b677353e8047568c61

  • SHA1

    e56d0ee9436ce04ab2713b0d39e6ac3310975e22

  • SHA256

    7b4442306f95cae594f78fd43d4c7f051868d00b328d40ee5321b3f11d4e401e

  • SHA512

    633d4331a64ff8f447d0504a0e603fe9ac52f6272bb3bc32509557997ea3803eebc2e3f4782d307b0054173f60584b5a268951337cef1effa296bc6191aa10b3

  • SSDEEP

    12288:Ky90BBE0/Wjmadin6gYxNBkQetW5Lwus9b4/jb4Jfr/XNu+DStjVEubV68eiy:KyKBETjmeRx3rsurbP+g68w

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Targets

    • Target

      7b4442306f95cae594f78fd43d4c7f051868d00b328d40ee5321b3f11d4e401e

    • Size

      774KB

    • MD5

      49a69cb0f1e7e9b677353e8047568c61

    • SHA1

      e56d0ee9436ce04ab2713b0d39e6ac3310975e22

    • SHA256

      7b4442306f95cae594f78fd43d4c7f051868d00b328d40ee5321b3f11d4e401e

    • SHA512

      633d4331a64ff8f447d0504a0e603fe9ac52f6272bb3bc32509557997ea3803eebc2e3f4782d307b0054173f60584b5a268951337cef1effa296bc6191aa10b3

    • SSDEEP

      12288:Ky90BBE0/Wjmadin6gYxNBkQetW5Lwus9b4/jb4Jfr/XNu+DStjVEubV68eiy:KyKBETjmeRx3rsurbP+g68w

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks