General

  • Target

    a41134e05c89c8151e7688e5687dd5dd25b0b76213da935073cb94070b585fc6

  • Size

    849KB

  • Sample

    241111-c4r4astqek

  • MD5

    6eefe246e611115d1cf53786cab9c2d6

  • SHA1

    13e083e45a67636851bfaeeb96cb6491097f77ad

  • SHA256

    a41134e05c89c8151e7688e5687dd5dd25b0b76213da935073cb94070b585fc6

  • SHA512

    3f19acf6a0b7bfd0e0361490a3d8d4bea3cdb1d22e1b778fd885a92cc0d0ae31de40d44c31e6fc1e7c7359e26197dfb8b93887a39fa1f305d389396ae83f9ad5

  • SSDEEP

    12288:7y90YLE9eKFltCYi/mZjkAGT9d3P8OSkDTBl0gdy015XwVVh4BEO0RqmojrokT:7y5KRZjA/P8OSsBug3Xwn6B6Rqm4v

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Targets

    • Target

      a41134e05c89c8151e7688e5687dd5dd25b0b76213da935073cb94070b585fc6

    • Size

      849KB

    • MD5

      6eefe246e611115d1cf53786cab9c2d6

    • SHA1

      13e083e45a67636851bfaeeb96cb6491097f77ad

    • SHA256

      a41134e05c89c8151e7688e5687dd5dd25b0b76213da935073cb94070b585fc6

    • SHA512

      3f19acf6a0b7bfd0e0361490a3d8d4bea3cdb1d22e1b778fd885a92cc0d0ae31de40d44c31e6fc1e7c7359e26197dfb8b93887a39fa1f305d389396ae83f9ad5

    • SSDEEP

      12288:7y90YLE9eKFltCYi/mZjkAGT9d3P8OSkDTBl0gdy015XwVVh4BEO0RqmojrokT:7y5KRZjA/P8OSsBug3Xwn6B6Rqm4v

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks