General

  • Target

    28e40945d9410bdc6dacd92278a59b32c27cf39bb3887ecd0af75d02318afd84N

  • Size

    574KB

  • Sample

    241113-fyf1mawgph

  • MD5

    c89f38261e782537a36f845e42f11e50

  • SHA1

    aa8ed59bfe4301bf004b025f5cc3e4b977e20d05

  • SHA256

    28e40945d9410bdc6dacd92278a59b32c27cf39bb3887ecd0af75d02318afd84

  • SHA512

    097ab74c0de1b807d957f77901e23c0cbcde8b44ea68d3ac0c235226104e4c7c8c4a470a697a88f47d3dc811d467b8ae2e2a89ff1c7329a13cc1c1b42dc73b41

  • SSDEEP

    12288:6xH/pyaMPAPF13lh4iJfUE6BXG5zCXqZhTVFFnMBiINrn:6p/4PAPBhZpP6s5pTVFWwIBn

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Targets

    • Target

      28e40945d9410bdc6dacd92278a59b32c27cf39bb3887ecd0af75d02318afd84N

    • Size

      574KB

    • MD5

      c89f38261e782537a36f845e42f11e50

    • SHA1

      aa8ed59bfe4301bf004b025f5cc3e4b977e20d05

    • SHA256

      28e40945d9410bdc6dacd92278a59b32c27cf39bb3887ecd0af75d02318afd84

    • SHA512

      097ab74c0de1b807d957f77901e23c0cbcde8b44ea68d3ac0c235226104e4c7c8c4a470a697a88f47d3dc811d467b8ae2e2a89ff1c7329a13cc1c1b42dc73b41

    • SSDEEP

      12288:6xH/pyaMPAPF13lh4iJfUE6BXG5zCXqZhTVFFnMBiINrn:6p/4PAPBhZpP6s5pTVFWwIBn

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks