General

  • Target

    5394210349ee8c3651a0cdf6e82a1798dacfcda0576966915458b2ba8da81b68

  • Size

    570KB

  • Sample

    241114-1z8r9atfqq

  • MD5

    20e2a9296becf771b5acd1b382503817

  • SHA1

    ab63aa67c61343d423357ca73601ec118fb8cb19

  • SHA256

    5394210349ee8c3651a0cdf6e82a1798dacfcda0576966915458b2ba8da81b68

  • SHA512

    11e10b0db6d0b564dbb8710e9cf04a3ce3f7de8b4350d6c9ae2f3afe7ea7fd18952d834c45ac1b3231c9afbac13154b3f86e4a9610006b2fee441d22542c94bf

  • SSDEEP

    12288:Hy90LzvdcFMIj8Jd9l2gUzNJJBqQApxbihr14Tz6QHGx0/8RFa:HyeDdGMiO7chzPzqvaj4Tz6QHGO/8i

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

danko

C2

185.161.248.73:4164

Attributes
  • auth_value

    784d42a6c1eb1a5060b8bcd3696f5f1e

Targets

    • Target

      5394210349ee8c3651a0cdf6e82a1798dacfcda0576966915458b2ba8da81b68

    • Size

      570KB

    • MD5

      20e2a9296becf771b5acd1b382503817

    • SHA1

      ab63aa67c61343d423357ca73601ec118fb8cb19

    • SHA256

      5394210349ee8c3651a0cdf6e82a1798dacfcda0576966915458b2ba8da81b68

    • SHA512

      11e10b0db6d0b564dbb8710e9cf04a3ce3f7de8b4350d6c9ae2f3afe7ea7fd18952d834c45ac1b3231c9afbac13154b3f86e4a9610006b2fee441d22542c94bf

    • SSDEEP

      12288:Hy90LzvdcFMIj8Jd9l2gUzNJJBqQApxbihr14Tz6QHGx0/8RFa:HyeDdGMiO7chzPzqvaj4Tz6QHGO/8i

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks