General

  • Target

    c1b12c588bfd207ac2a937329508ed39e5670b4d195c4a261f0053e8cc320fd9N.exe

  • Size

    475KB

  • Sample

    241114-azlplssclq

  • MD5

    c5d7fc710bc26fc0546b3534c41c0c30

  • SHA1

    e192e3ea2a78c472efe112170030fc3644ccf24a

  • SHA256

    c1b12c588bfd207ac2a937329508ed39e5670b4d195c4a261f0053e8cc320fd9

  • SHA512

    9071833eaff83c41e5ee6ca1fab443b7522e91ea13793e3be3c5bcdd20a6454def403a9e969c3154b95c275a64468050c9b5018f0e4be1737527a08d33e7c312

  • SSDEEP

    12288:LMkirqvzrLWKm50jUw99o25hJT2bZmnHTCl2l6kF7Q:Ijq7W90599iszCwlBxQ

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Targets

    • Target

      c1b12c588bfd207ac2a937329508ed39e5670b4d195c4a261f0053e8cc320fd9N.exe

    • Size

      475KB

    • MD5

      c5d7fc710bc26fc0546b3534c41c0c30

    • SHA1

      e192e3ea2a78c472efe112170030fc3644ccf24a

    • SHA256

      c1b12c588bfd207ac2a937329508ed39e5670b4d195c4a261f0053e8cc320fd9

    • SHA512

      9071833eaff83c41e5ee6ca1fab443b7522e91ea13793e3be3c5bcdd20a6454def403a9e969c3154b95c275a64468050c9b5018f0e4be1737527a08d33e7c312

    • SSDEEP

      12288:LMkirqvzrLWKm50jUw99o25hJT2bZmnHTCl2l6kF7Q:Ijq7W90599iszCwlBxQ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks