General

  • Target

    4b6aadc4b853e87bde5b904a546ab560bb466a9bebc3e02df2623907ec81701dN

  • Size

    530KB

  • Sample

    241111-b9mv4asrgm

  • MD5

    1017830f28045918c941aa000e4059e0

  • SHA1

    894102cbd57593742f5d07901d989f5820a46855

  • SHA256

    4b6aadc4b853e87bde5b904a546ab560bb466a9bebc3e02df2623907ec81701d

  • SHA512

    962d00647ba4b6a712059611511cd299aedf285a8ab30c519a4b4b8b2caf4b057aaf27690519ac592389f2e2edbaba78a879757ac9a47bd5d2abf9a64a526328

  • SSDEEP

    6144:Xf+tFwZ1VSpZlg5XQIt6UqUm82+jDxTMjUa+pSZWeeSyIiCsF/nNDHgI5KLQG+:PMFw92g5gi6bhqDmrUS3JAVNHgI5G2

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Targets

    • Target

      4b6aadc4b853e87bde5b904a546ab560bb466a9bebc3e02df2623907ec81701dN

    • Size

      530KB

    • MD5

      1017830f28045918c941aa000e4059e0

    • SHA1

      894102cbd57593742f5d07901d989f5820a46855

    • SHA256

      4b6aadc4b853e87bde5b904a546ab560bb466a9bebc3e02df2623907ec81701d

    • SHA512

      962d00647ba4b6a712059611511cd299aedf285a8ab30c519a4b4b8b2caf4b057aaf27690519ac592389f2e2edbaba78a879757ac9a47bd5d2abf9a64a526328

    • SSDEEP

      6144:Xf+tFwZ1VSpZlg5XQIt6UqUm82+jDxTMjUa+pSZWeeSyIiCsF/nNDHgI5KLQG+:PMFw92g5gi6bhqDmrUS3JAVNHgI5G2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks