General

  • Target

    1009180a099dea7dfefaac48586008563589e962df14dfb0e041cc8970690991

  • Size

    792KB

  • Sample

    241111-jwvmsawfpc

  • MD5

    2ea3e3f6af40ce6d06995807db65dca7

  • SHA1

    d731c2f4b68c5bae48bcb6373ecc3b7ac1d465af

  • SHA256

    1009180a099dea7dfefaac48586008563589e962df14dfb0e041cc8970690991

  • SHA512

    962c7a93bfe48f95144f5b18b69bccada88b078ee5bfb1639dd7258d42bfea1d2c9ecb541970724f2b1584117317f81b75e2595588dfd2f6179183d77efb2fe7

  • SSDEEP

    12288:Ay90pZV/qWjm/Ahsah3+V1ErCi1Tuf57x+4qisZTHR6vugJexqRUgJu9Wt:AyaZV/Y/AP3tKbUrZTx6WqK3Wt

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Targets

    • Target

      1009180a099dea7dfefaac48586008563589e962df14dfb0e041cc8970690991

    • Size

      792KB

    • MD5

      2ea3e3f6af40ce6d06995807db65dca7

    • SHA1

      d731c2f4b68c5bae48bcb6373ecc3b7ac1d465af

    • SHA256

      1009180a099dea7dfefaac48586008563589e962df14dfb0e041cc8970690991

    • SHA512

      962c7a93bfe48f95144f5b18b69bccada88b078ee5bfb1639dd7258d42bfea1d2c9ecb541970724f2b1584117317f81b75e2595588dfd2f6179183d77efb2fe7

    • SSDEEP

      12288:Ay90pZV/qWjm/Ahsah3+V1ErCi1Tuf57x+4qisZTHR6vugJexqRUgJu9Wt:AyaZV/Y/AP3tKbUrZTx6WqK3Wt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks