General

  • Target

    369a1e53566e4f93607dd4ddb69ee6cb7c62550732bc3334a577d8ae2079c17bN

  • Size

    866KB

  • Sample

    241111-bkm5kaygmj

  • MD5

    51b318427091ab09dd4d69b697beb980

  • SHA1

    0176009815c674f605203562f016e79c54561f45

  • SHA256

    369a1e53566e4f93607dd4ddb69ee6cb7c62550732bc3334a577d8ae2079c17b

  • SHA512

    016c8655b27355d18ff049f331e5dd1f0e498617b53a76f5fb1f967cd183a374312a47fd2c537d8998acb3f9d2be4c96ab4d7309a40b2dc03266c2dfd35fe602

  • SSDEEP

    12288:Ny90KcpwCqRQL7R4d5XpDXi7t5xiKSBEVwcS5PWCJul5+KlR5:Ny2wCvL7+de7tXi0ZS5u+KT5

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Targets

    • Target

      369a1e53566e4f93607dd4ddb69ee6cb7c62550732bc3334a577d8ae2079c17bN

    • Size

      866KB

    • MD5

      51b318427091ab09dd4d69b697beb980

    • SHA1

      0176009815c674f605203562f016e79c54561f45

    • SHA256

      369a1e53566e4f93607dd4ddb69ee6cb7c62550732bc3334a577d8ae2079c17b

    • SHA512

      016c8655b27355d18ff049f331e5dd1f0e498617b53a76f5fb1f967cd183a374312a47fd2c537d8998acb3f9d2be4c96ab4d7309a40b2dc03266c2dfd35fe602

    • SSDEEP

      12288:Ny90KcpwCqRQL7R4d5XpDXi7t5xiKSBEVwcS5PWCJul5+KlR5:Ny2wCvL7+de7tXi0ZS5u+KT5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks