General

  • Target

    757b9a6897d05d302df281adc054ba8f246d9e4e372af2f406523784549d063a

  • Size

    793KB

  • Sample

    241110-qj7vxaxgle

  • MD5

    48d61137d9d0c706699520206ca40fa1

  • SHA1

    5b07769b6cf7689fdf238ce9783e93360033db06

  • SHA256

    757b9a6897d05d302df281adc054ba8f246d9e4e372af2f406523784549d063a

  • SHA512

    b127e391fba8de0ea011287af9d49b52ba1d4b099fe796e27cbe421dc2330ca2c3ebcd0bb5d57a2777ccb09b0e9c1bb08757399a85e3aa84049ba4901b29303b

  • SSDEEP

    24576:ryrP58ccwn7Rb5nhZHbU/0y5zXBTf0LOSI:erh8ccw7z2JzXBT8L

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Targets

    • Target

      757b9a6897d05d302df281adc054ba8f246d9e4e372af2f406523784549d063a

    • Size

      793KB

    • MD5

      48d61137d9d0c706699520206ca40fa1

    • SHA1

      5b07769b6cf7689fdf238ce9783e93360033db06

    • SHA256

      757b9a6897d05d302df281adc054ba8f246d9e4e372af2f406523784549d063a

    • SHA512

      b127e391fba8de0ea011287af9d49b52ba1d4b099fe796e27cbe421dc2330ca2c3ebcd0bb5d57a2777ccb09b0e9c1bb08757399a85e3aa84049ba4901b29303b

    • SSDEEP

      24576:ryrP58ccwn7Rb5nhZHbU/0y5zXBTf0LOSI:erh8ccw7z2JzXBT8L

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks