General

  • Target

    e225104547f7cd3e002ae69ac88c2ff8515afd54a835f9d6d1bdb528d32f50cdN.exe

  • Size

    773KB

  • Sample

    241113-pre97asbje

  • MD5

    4294bf15de1e13315f9cc13f9365b2c0

  • SHA1

    6009cc4a472a8011e2d69ec18cc8d9d7ab26a2cc

  • SHA256

    e225104547f7cd3e002ae69ac88c2ff8515afd54a835f9d6d1bdb528d32f50cd

  • SHA512

    6bdc2a28016690e9a68590ae16e443067261b3d91ea863a3c5614f5e3f59f6d604ec085405d2fd72ae5f1cafff736fddbe313a3a299ffa05a25c7b5a14acc87c

  • SSDEEP

    12288:Wy90Td+yErsNNoMvHZ/Tl9gOxJBkneTWyLnPscUo/Pb4JVgCkxk/0JXllSxRiNlU:WyzINNlHZtxrZsQHb86W

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Targets

    • Target

      e225104547f7cd3e002ae69ac88c2ff8515afd54a835f9d6d1bdb528d32f50cdN.exe

    • Size

      773KB

    • MD5

      4294bf15de1e13315f9cc13f9365b2c0

    • SHA1

      6009cc4a472a8011e2d69ec18cc8d9d7ab26a2cc

    • SHA256

      e225104547f7cd3e002ae69ac88c2ff8515afd54a835f9d6d1bdb528d32f50cd

    • SHA512

      6bdc2a28016690e9a68590ae16e443067261b3d91ea863a3c5614f5e3f59f6d604ec085405d2fd72ae5f1cafff736fddbe313a3a299ffa05a25c7b5a14acc87c

    • SSDEEP

      12288:Wy90Td+yErsNNoMvHZ/Tl9gOxJBkneTWyLnPscUo/Pb4JVgCkxk/0JXllSxRiNlU:WyzINNlHZtxrZsQHb86W

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks