General

  • Target

    2d4f2544c196e103871851a01f3b572b9060d63c632bf4c0e501f790080267e7

  • Size

    888KB

  • Sample

    241111-a6ppvayejn

  • MD5

    c3f9643841eb012ed29ebf7dcb8c94ee

  • SHA1

    1285f72f19100452a0eae014344a2bdb3af8d76e

  • SHA256

    2d4f2544c196e103871851a01f3b572b9060d63c632bf4c0e501f790080267e7

  • SHA512

    f3e4648d8a13a89a8e5b68ea99d10c722360abd8ddba00ccc2950aa1efcdbfcdff71909f8888f0c29dcdba60eb077f9408350ba88026452ab519c43d9ce25c3e

  • SSDEEP

    24576:gyBp4i+JBsENr1bKChewVO7Q16YTwo2DJc2cOERc:nBCi+sENpbKqZc/MwoyJJh

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dork

C2

185.161.248.73:4164

Attributes
  • auth_value

    e81be7d6cfb453cc812e1b4890eeadad

Targets

    • Target

      2d4f2544c196e103871851a01f3b572b9060d63c632bf4c0e501f790080267e7

    • Size

      888KB

    • MD5

      c3f9643841eb012ed29ebf7dcb8c94ee

    • SHA1

      1285f72f19100452a0eae014344a2bdb3af8d76e

    • SHA256

      2d4f2544c196e103871851a01f3b572b9060d63c632bf4c0e501f790080267e7

    • SHA512

      f3e4648d8a13a89a8e5b68ea99d10c722360abd8ddba00ccc2950aa1efcdbfcdff71909f8888f0c29dcdba60eb077f9408350ba88026452ab519c43d9ce25c3e

    • SSDEEP

      24576:gyBp4i+JBsENr1bKChewVO7Q16YTwo2DJc2cOERc:nBCi+sENpbKqZc/MwoyJJh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks