General

  • Target

    6c757d9e579c3589c6dc6b431f9fad7ce4d9d28b2390ff2abbba8378add49109

  • Size

    891KB

  • Sample

    241111-bn2gcsygqr

  • MD5

    45d553ffc9bb40bf78c7ee88425e8ff7

  • SHA1

    2c0f6e7cfd94e786123e819b961df77c6b275283

  • SHA256

    6c757d9e579c3589c6dc6b431f9fad7ce4d9d28b2390ff2abbba8378add49109

  • SHA512

    7550a0665f5b5df1a28d703d1e3a935e2a462960519c1a32197f44a762c8bd7dc56c486061fd285a39049bcf61839b11e78e4a68f1cff2af91214a212b31b236

  • SSDEEP

    24576:NyMalrSX8B23PJHaPFLiLsCQ6jtdY8IWSeg19:o4W23PJ6PFLUJPd3I7

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dork

C2

185.161.248.73:4164

Attributes
  • auth_value

    e81be7d6cfb453cc812e1b4890eeadad

Targets

    • Target

      6c757d9e579c3589c6dc6b431f9fad7ce4d9d28b2390ff2abbba8378add49109

    • Size

      891KB

    • MD5

      45d553ffc9bb40bf78c7ee88425e8ff7

    • SHA1

      2c0f6e7cfd94e786123e819b961df77c6b275283

    • SHA256

      6c757d9e579c3589c6dc6b431f9fad7ce4d9d28b2390ff2abbba8378add49109

    • SHA512

      7550a0665f5b5df1a28d703d1e3a935e2a462960519c1a32197f44a762c8bd7dc56c486061fd285a39049bcf61839b11e78e4a68f1cff2af91214a212b31b236

    • SSDEEP

      24576:NyMalrSX8B23PJHaPFLiLsCQ6jtdY8IWSeg19:o4W23PJ6PFLUJPd3I7

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks