General

  • Target

    21102b3fb0cee6dd7bb96510b7b71a1bea853bd35f63d235fe5ed068ef852dd2

  • Size

    581KB

  • Sample

    241112-y5yhcszhre

  • MD5

    fdac6dfb819f92d19ecac80c3f518c22

  • SHA1

    123d56972e946b4e18cf84c4198d7f56bc27a375

  • SHA256

    21102b3fb0cee6dd7bb96510b7b71a1bea853bd35f63d235fe5ed068ef852dd2

  • SHA512

    95eb4bde4d8ee484366e08b438dcc29ceca5b262eab7a4129721db7dc7e3e2f86b77136e3fc051cf9272fd55199a1b9d118db2659701f460f31c72a7385a3039

  • SSDEEP

    12288:SgnXCptMOVe6UUOA2OFwXy+d15GVXLGrLmRF:SWX+VBUUoOFwC+9GNL2c

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Targets

    • Target

      21102b3fb0cee6dd7bb96510b7b71a1bea853bd35f63d235fe5ed068ef852dd2

    • Size

      581KB

    • MD5

      fdac6dfb819f92d19ecac80c3f518c22

    • SHA1

      123d56972e946b4e18cf84c4198d7f56bc27a375

    • SHA256

      21102b3fb0cee6dd7bb96510b7b71a1bea853bd35f63d235fe5ed068ef852dd2

    • SHA512

      95eb4bde4d8ee484366e08b438dcc29ceca5b262eab7a4129721db7dc7e3e2f86b77136e3fc051cf9272fd55199a1b9d118db2659701f460f31c72a7385a3039

    • SSDEEP

      12288:SgnXCptMOVe6UUOA2OFwXy+d15GVXLGrLmRF:SWX+VBUUoOFwC+9GNL2c

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks