General

  • Target

    f339fd215d5fa3fa61e17a45676bbb667806d35e09b1a31013539d4e9536cfff.exe

  • Size

    866KB

  • Sample

    241113-2t5n3s1dqq

  • MD5

    f79f2a67d1c52c4fc4ce425e6766d396

  • SHA1

    3350c47677bd9f85d528aaf554299b30d290c339

  • SHA256

    f339fd215d5fa3fa61e17a45676bbb667806d35e09b1a31013539d4e9536cfff

  • SHA512

    b22a6a9c3d407ef7627bdaf27e196bba6a92d6a94af7901f9afdbd39f45d070334e9f419f93fd3a34c9ef9033e056967f2c449efed5cbc82df7d45af8bcd80d1

  • SSDEEP

    24576:RyhDv7zpuV3DHLIuyHu2GTQIQxzZwUjBIzgr:EhDvJulDHL5yHVgQIKl9jt

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Targets

    • Target

      f339fd215d5fa3fa61e17a45676bbb667806d35e09b1a31013539d4e9536cfff.exe

    • Size

      866KB

    • MD5

      f79f2a67d1c52c4fc4ce425e6766d396

    • SHA1

      3350c47677bd9f85d528aaf554299b30d290c339

    • SHA256

      f339fd215d5fa3fa61e17a45676bbb667806d35e09b1a31013539d4e9536cfff

    • SHA512

      b22a6a9c3d407ef7627bdaf27e196bba6a92d6a94af7901f9afdbd39f45d070334e9f419f93fd3a34c9ef9033e056967f2c449efed5cbc82df7d45af8bcd80d1

    • SSDEEP

      24576:RyhDv7zpuV3DHLIuyHu2GTQIQxzZwUjBIzgr:EhDvJulDHL5yHVgQIKl9jt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks