General

  • Target

    831f3afec7cf89e368447ff19c0548cbd9dd5237ab91f299f9dc4b7b7818079a

  • Size

    850KB

  • Sample

    241111-fd8j5swqam

  • MD5

    9e567edee19cf309ac3d2b2bf576aa8a

  • SHA1

    76c447c61e956e681a30c9941362ffb7d3a71266

  • SHA256

    831f3afec7cf89e368447ff19c0548cbd9dd5237ab91f299f9dc4b7b7818079a

  • SHA512

    270b8f360e8d9a840f627c5393e3110fa6666212f1aa0b775167e1301497461b75c8b00510ae1a673f92ed981097c23321b78d161017f621d484d6e2e4363bc2

  • SSDEEP

    12288:qy90DOSfhGdTx5ITUxIsKgsxQBkgeCWBLQcsxD//gb4JxxifYNGzFuzBRuexPxl6:qysLfhcMUzMxOys1obIiZF+DzxeR

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Targets

    • Target

      831f3afec7cf89e368447ff19c0548cbd9dd5237ab91f299f9dc4b7b7818079a

    • Size

      850KB

    • MD5

      9e567edee19cf309ac3d2b2bf576aa8a

    • SHA1

      76c447c61e956e681a30c9941362ffb7d3a71266

    • SHA256

      831f3afec7cf89e368447ff19c0548cbd9dd5237ab91f299f9dc4b7b7818079a

    • SHA512

      270b8f360e8d9a840f627c5393e3110fa6666212f1aa0b775167e1301497461b75c8b00510ae1a673f92ed981097c23321b78d161017f621d484d6e2e4363bc2

    • SSDEEP

      12288:qy90DOSfhGdTx5ITUxIsKgsxQBkgeCWBLQcsxD//gb4JxxifYNGzFuzBRuexPxl6:qysLfhcMUzMxOys1obIiZF+DzxeR

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks