General

  • Target

    86444983ece5602c7683ba9e88d1e2a642c8d92835f503d6c63f77e9b8d29462

  • Size

    575KB

  • Sample

    241114-3t7n4svkfv

  • MD5

    16318eb9e648f1019c4b85234417f43b

  • SHA1

    3efc415bbd023de8deb67075d10fe0ec74edb6ec

  • SHA256

    86444983ece5602c7683ba9e88d1e2a642c8d92835f503d6c63f77e9b8d29462

  • SHA512

    6c19f583b62c7df0f4c90cce3b63cc531e62c91ee0e21244d453e5b9c54ca79d501a19b02a838db2ecbd71b63afb035cd0a4b0df1b433448033f92c47106ff72

  • SSDEEP

    12288:o91WnKygIjVozbSH0IUADHHZgIT4G0cIKds3N:41RIjFH0IUKHH2IxIKE

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Targets

    • Target

      86444983ece5602c7683ba9e88d1e2a642c8d92835f503d6c63f77e9b8d29462

    • Size

      575KB

    • MD5

      16318eb9e648f1019c4b85234417f43b

    • SHA1

      3efc415bbd023de8deb67075d10fe0ec74edb6ec

    • SHA256

      86444983ece5602c7683ba9e88d1e2a642c8d92835f503d6c63f77e9b8d29462

    • SHA512

      6c19f583b62c7df0f4c90cce3b63cc531e62c91ee0e21244d453e5b9c54ca79d501a19b02a838db2ecbd71b63afb035cd0a4b0df1b433448033f92c47106ff72

    • SSDEEP

      12288:o91WnKygIjVozbSH0IUADHHZgIT4G0cIKds3N:41RIjFH0IUKHH2IxIKE

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks