General

  • Target

    cbc2daa1dc0db2ef3077e288dc88524f1316bea19abb983378cf294c6d0a1c26N.exe

  • Size

    530KB

  • Sample

    241113-j6aqcsxmgy

  • MD5

    43e338f88751f27a786958c23f3e5164

  • SHA1

    e4d3629cbf40fc1b6ba08b5218cd97f2a697ab96

  • SHA256

    cb338054803f1ae48db75c6178fab4b46e858831d67440908f6d42b86ed80e4d

  • SHA512

    868233529add8075789eab5f0d980059bb5281727ea55c4ed10299e5c3d11bf6d54f07a5b8077b625e747c7b661373935196ecf52deaa6f324e5d94423ca2fcb

  • SSDEEP

    12288:nlcaxRaNnn6mbtR50wisMIw1nefXIf10o:OSenpRPisFwMQOo

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Targets

    • Target

      cbc2daa1dc0db2ef3077e288dc88524f1316bea19abb983378cf294c6d0a1c26N.exe

    • Size

      530KB

    • MD5

      43e338f88751f27a786958c23f3e5164

    • SHA1

      e4d3629cbf40fc1b6ba08b5218cd97f2a697ab96

    • SHA256

      cb338054803f1ae48db75c6178fab4b46e858831d67440908f6d42b86ed80e4d

    • SHA512

      868233529add8075789eab5f0d980059bb5281727ea55c4ed10299e5c3d11bf6d54f07a5b8077b625e747c7b661373935196ecf52deaa6f324e5d94423ca2fcb

    • SSDEEP

      12288:nlcaxRaNnn6mbtR50wisMIw1nefXIf10o:OSenpRPisFwMQOo

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks