General

  • Target

    a04bb961996c6e7d94f72c4c5fe5aec2ac79ffde6fe8c5e30ea4a50aac41876a.exe

  • Size

    488KB

  • Sample

    241113-dl7xgavkdw

  • MD5

    d372edaf8baf049d08c86a1cd6fb7d75

  • SHA1

    7fd9a0b6b177855c3a297bd514e5049a39810269

  • SHA256

    a04bb961996c6e7d94f72c4c5fe5aec2ac79ffde6fe8c5e30ea4a50aac41876a

  • SHA512

    90c95e11592f34f560811d29539f823d6e3c5e6b1378a2c0c6e8e5778488227dbe27751369216edbb1de9cbb27a4507c405609f2ec07cfcf83d9120a2221ae22

  • SSDEEP

    12288:3yyrElOIzAeS87kpIO6xMcX1HPKSIsO7Np:iK0fZhbX1H7IsO73

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Targets

    • Target

      a04bb961996c6e7d94f72c4c5fe5aec2ac79ffde6fe8c5e30ea4a50aac41876a.exe

    • Size

      488KB

    • MD5

      d372edaf8baf049d08c86a1cd6fb7d75

    • SHA1

      7fd9a0b6b177855c3a297bd514e5049a39810269

    • SHA256

      a04bb961996c6e7d94f72c4c5fe5aec2ac79ffde6fe8c5e30ea4a50aac41876a

    • SHA512

      90c95e11592f34f560811d29539f823d6e3c5e6b1378a2c0c6e8e5778488227dbe27751369216edbb1de9cbb27a4507c405609f2ec07cfcf83d9120a2221ae22

    • SSDEEP

      12288:3yyrElOIzAeS87kpIO6xMcX1HPKSIsO7Np:iK0fZhbX1H7IsO73

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks