General

  • Target

    d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f

  • Size

    793KB

  • Sample

    241110-t6l4hazncy

  • MD5

    f8f30664ab748bcd3257c54ad9730d90

  • SHA1

    48fb7a8650a8c78e8663aacb48b0dd2ec5c95b2b

  • SHA256

    d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f

  • SHA512

    4e677859813c2cbe2f20806e0796df70ed4d5767f1a02906903ad585a4402a9d887bf7ce0917c33c9ca9d16217fb178203890926a21c9006b5be18867a5d6cf1

  • SSDEEP

    24576:7y8B4nQYkTwtnfRSHmLPOy8aoJGPJ+0TjE:u8inQYWwtfoQ+qg0Tj

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Targets

    • Target

      d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f

    • Size

      793KB

    • MD5

      f8f30664ab748bcd3257c54ad9730d90

    • SHA1

      48fb7a8650a8c78e8663aacb48b0dd2ec5c95b2b

    • SHA256

      d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f

    • SHA512

      4e677859813c2cbe2f20806e0796df70ed4d5767f1a02906903ad585a4402a9d887bf7ce0917c33c9ca9d16217fb178203890926a21c9006b5be18867a5d6cf1

    • SSDEEP

      24576:7y8B4nQYkTwtnfRSHmLPOy8aoJGPJ+0TjE:u8inQYWwtfoQ+qg0Tj

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks