General

  • Target

    b5aa5e031380c0f36adfd38eafbb4ad7688850acefd787fe27e6985924d971bb.exe

  • Size

    576KB

  • Sample

    241113-cfkz3svdmm

  • MD5

    808afc4bf9be8a08656cb64c8ff7cd47

  • SHA1

    fc56fa249fcb17bd27187636a60f1e2344ea4edd

  • SHA256

    b5aa5e031380c0f36adfd38eafbb4ad7688850acefd787fe27e6985924d971bb

  • SHA512

    70c1e7a470bd1f61e031df70145e3ab1cfabe15239d6680b83dbf79d8a6467140b5b1fe4a19ca1b11610f7128bc0db758a01220e730aaff27a6844a8dad9b5a7

  • SSDEEP

    12288:T8Lx8V4JrnK6sNHpH8qaVjIRhNQLkMIFyvvpq:TWx5re8pjIJWdIFixq

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Targets

    • Target

      b5aa5e031380c0f36adfd38eafbb4ad7688850acefd787fe27e6985924d971bb.exe

    • Size

      576KB

    • MD5

      808afc4bf9be8a08656cb64c8ff7cd47

    • SHA1

      fc56fa249fcb17bd27187636a60f1e2344ea4edd

    • SHA256

      b5aa5e031380c0f36adfd38eafbb4ad7688850acefd787fe27e6985924d971bb

    • SHA512

      70c1e7a470bd1f61e031df70145e3ab1cfabe15239d6680b83dbf79d8a6467140b5b1fe4a19ca1b11610f7128bc0db758a01220e730aaff27a6844a8dad9b5a7

    • SSDEEP

      12288:T8Lx8V4JrnK6sNHpH8qaVjIRhNQLkMIFyvvpq:TWx5re8pjIJWdIFixq

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks