General

  • Target

    a00e1b63a334572d366890c336714c12d4e5e6feb30cdbaaff1ca8a0b6debb3b

  • Size

    890KB

  • Sample

    241111-jrk8jsvnfz

  • MD5

    adc1c5de298a24ffa7bd5e56520df57a

  • SHA1

    a51cf0449ff0763a933d0a909c1f626f2619cd1a

  • SHA256

    a00e1b63a334572d366890c336714c12d4e5e6feb30cdbaaff1ca8a0b6debb3b

  • SHA512

    0828cba584b7a047578bca4be6ccfd94e5353664be73f4aa0b4131231967df08867c580b4fcb6a624d2b265fefd1706d402f1e1e85c25b0c9c9e99383c0cdb62

  • SSDEEP

    24576:xyH6Ei8w1nDR3Hni1cOqv44b9oruXkCzox5ozLO:kaow1DVO2PSaXFc5oz

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Targets

    • Target

      a00e1b63a334572d366890c336714c12d4e5e6feb30cdbaaff1ca8a0b6debb3b

    • Size

      890KB

    • MD5

      adc1c5de298a24ffa7bd5e56520df57a

    • SHA1

      a51cf0449ff0763a933d0a909c1f626f2619cd1a

    • SHA256

      a00e1b63a334572d366890c336714c12d4e5e6feb30cdbaaff1ca8a0b6debb3b

    • SHA512

      0828cba584b7a047578bca4be6ccfd94e5353664be73f4aa0b4131231967df08867c580b4fcb6a624d2b265fefd1706d402f1e1e85c25b0c9c9e99383c0cdb62

    • SSDEEP

      24576:xyH6Ei8w1nDR3Hni1cOqv44b9oruXkCzox5ozLO:kaow1DVO2PSaXFc5oz

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks