General

  • Target

    464d4f56ad37f79423079bf178479ecc7df1e9ded300fcb93e4654b61362c791

  • Size

    842KB

  • Sample

    241114-1hgbnsxken

  • MD5

    564f7536dea23e7e2c8e794d02b06d94

  • SHA1

    c2aa202ec800d72eafda0c47ca6217d8688b80c6

  • SHA256

    464d4f56ad37f79423079bf178479ecc7df1e9ded300fcb93e4654b61362c791

  • SHA512

    4b82b0cb8c1e42c4054aa2eb3c081734832914298cf5e3b6bafbcaf0a77cc3a322a1a6cc40ee1aef71ddbcf777ee81c61b2c7b239ba2c57cb53d3637d2d8d2a8

  • SSDEEP

    12288:2y90DFbngqIKFKFwJlfUF6YlBZqHkrgMTHoIrxDHFZgcTg3phY1WpBAO:2yDqxF7JlfWaLSHoIr9HF2cOhYsBAO

Malware Config

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Targets

    • Target

      464d4f56ad37f79423079bf178479ecc7df1e9ded300fcb93e4654b61362c791

    • Size

      842KB

    • MD5

      564f7536dea23e7e2c8e794d02b06d94

    • SHA1

      c2aa202ec800d72eafda0c47ca6217d8688b80c6

    • SHA256

      464d4f56ad37f79423079bf178479ecc7df1e9ded300fcb93e4654b61362c791

    • SHA512

      4b82b0cb8c1e42c4054aa2eb3c081734832914298cf5e3b6bafbcaf0a77cc3a322a1a6cc40ee1aef71ddbcf777ee81c61b2c7b239ba2c57cb53d3637d2d8d2a8

    • SSDEEP

      12288:2y90DFbngqIKFKFwJlfUF6YlBZqHkrgMTHoIrxDHFZgcTg3phY1WpBAO:2yDqxF7JlfWaLSHoIr9HF2cOhYsBAO

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks