General

  • Target

    b13c9a5aea918bb14b9e8626092f91c9b574886842cb3c1ea7333a5c033969ec

  • Size

    794KB

  • Sample

    241110-s1g2xsyqat

  • MD5

    ca9a241f0ee9d51d04e47b5bf566b11a

  • SHA1

    64bb71290652a2f0b0893ba0b81979a0d4c8371c

  • SHA256

    b13c9a5aea918bb14b9e8626092f91c9b574886842cb3c1ea7333a5c033969ec

  • SHA512

    3cd044eced5ce68ad91f7afa89c44c866972a381ed8569031905cae2c626a97c4488a193eea5159bc4237b4600a73d464f82478005fc3965e236a3d87622db8e

  • SSDEEP

    24576:VycKurZevJebcrHmOnoRS2fJI+T/Nn36uG1KBf:wu1evaczmOov7Nn1

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Targets

    • Target

      b13c9a5aea918bb14b9e8626092f91c9b574886842cb3c1ea7333a5c033969ec

    • Size

      794KB

    • MD5

      ca9a241f0ee9d51d04e47b5bf566b11a

    • SHA1

      64bb71290652a2f0b0893ba0b81979a0d4c8371c

    • SHA256

      b13c9a5aea918bb14b9e8626092f91c9b574886842cb3c1ea7333a5c033969ec

    • SHA512

      3cd044eced5ce68ad91f7afa89c44c866972a381ed8569031905cae2c626a97c4488a193eea5159bc4237b4600a73d464f82478005fc3965e236a3d87622db8e

    • SSDEEP

      24576:VycKurZevJebcrHmOnoRS2fJI+T/Nn36uG1KBf:wu1evaczmOov7Nn1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks