General

  • Target

    2189ea87ed9b5d365fe54f2d5114aa843aff00383ac0def9096debef35e53062

  • Size

    890KB

  • Sample

    241111-dr2mms1frl

  • MD5

    6990299157c8a47518b0a730c467b4a2

  • SHA1

    01fd91f4d31d5f5e28d53e86e87a68c7cd84bcf9

  • SHA256

    2189ea87ed9b5d365fe54f2d5114aa843aff00383ac0def9096debef35e53062

  • SHA512

    7f364f723cb18a29907480acd566578de92d208e4c316801c3d64b53ee2a1371df9a1d1f3708a7314ded6d7637083d5bdf3de43df044fa4c41b6e2087f116825

  • SSDEEP

    24576:5yCHTGxneRVOn6nFTaYIneZRgwxqiew3Cmxu/:scyxeivYRdx3e6Cmx

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Targets

    • Target

      2189ea87ed9b5d365fe54f2d5114aa843aff00383ac0def9096debef35e53062

    • Size

      890KB

    • MD5

      6990299157c8a47518b0a730c467b4a2

    • SHA1

      01fd91f4d31d5f5e28d53e86e87a68c7cd84bcf9

    • SHA256

      2189ea87ed9b5d365fe54f2d5114aa843aff00383ac0def9096debef35e53062

    • SHA512

      7f364f723cb18a29907480acd566578de92d208e4c316801c3d64b53ee2a1371df9a1d1f3708a7314ded6d7637083d5bdf3de43df044fa4c41b6e2087f116825

    • SSDEEP

      24576:5yCHTGxneRVOn6nFTaYIneZRgwxqiew3Cmxu/:scyxeivYRdx3e6Cmx

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks