General

  • Target

    b144c73f1105004664b0d068ebdd72ffad32e1c2ecdd29c0781b41811f50f1d0

  • Size

    774KB

  • Sample

    241111-c35b8stqcr

  • MD5

    9ec1250161c039d06e9bc8cc21c43090

  • SHA1

    12ee38fcd8ccbf3cc30fbeb05ba453621c4ce83d

  • SHA256

    b144c73f1105004664b0d068ebdd72ffad32e1c2ecdd29c0781b41811f50f1d0

  • SHA512

    86bbb03890c1a736f3118faabbc301c2a72ee42b46f8a1a4482974e1110dd6030d8e77aaaf8e0ff99e19bb6734d4204d15281e76f7eae92aad1b5d148bf62786

  • SSDEEP

    12288:Ky902Ejk0feiL6DBJvfpnwQ6ghxHBkzecWyLH+sKcg/7b4JCu11oP4h206Vc7qAj:KyGj/+lJv9BxxhpsqDbh7Ptizh

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Targets

    • Target

      b144c73f1105004664b0d068ebdd72ffad32e1c2ecdd29c0781b41811f50f1d0

    • Size

      774KB

    • MD5

      9ec1250161c039d06e9bc8cc21c43090

    • SHA1

      12ee38fcd8ccbf3cc30fbeb05ba453621c4ce83d

    • SHA256

      b144c73f1105004664b0d068ebdd72ffad32e1c2ecdd29c0781b41811f50f1d0

    • SHA512

      86bbb03890c1a736f3118faabbc301c2a72ee42b46f8a1a4482974e1110dd6030d8e77aaaf8e0ff99e19bb6734d4204d15281e76f7eae92aad1b5d148bf62786

    • SSDEEP

      12288:Ky902Ejk0feiL6DBJvfpnwQ6ghxHBkzecWyLH+sKcg/7b4JCu11oP4h206Vc7qAj:KyGj/+lJv9BxxhpsqDbh7Ptizh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks