General

  • Target

    f06cb8dc87b5f8ceda04af27ae903b72185ff0bea0513bb71cb79645ffd2fd7fN.exe

  • Size

    580KB

  • Sample

    241114-bla7dssdna

  • MD5

    128ccc34ef0860d16910c1258ccbd2a0

  • SHA1

    575cc64fc748ce87c4dd29152d520e93e88b9e41

  • SHA256

    f06cb8dc87b5f8ceda04af27ae903b72185ff0bea0513bb71cb79645ffd2fd7f

  • SHA512

    9a7e9c2dff6cc39842ed183b8100b2f16940f8bebc284442ba5267dc423f4f20c484c49cc340d9fcf3079a28d8ce0c9e129322fbd8a995fed729ccc7167823a7

  • SSDEEP

    12288:xtH1MEahAJJ6uJoaNTTT4dSpIbGmEo6hrDbbZ8K65R7:xF1JmujPcdSSGmT6Zbd8JR7

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Targets

    • Target

      f06cb8dc87b5f8ceda04af27ae903b72185ff0bea0513bb71cb79645ffd2fd7fN.exe

    • Size

      580KB

    • MD5

      128ccc34ef0860d16910c1258ccbd2a0

    • SHA1

      575cc64fc748ce87c4dd29152d520e93e88b9e41

    • SHA256

      f06cb8dc87b5f8ceda04af27ae903b72185ff0bea0513bb71cb79645ffd2fd7f

    • SHA512

      9a7e9c2dff6cc39842ed183b8100b2f16940f8bebc284442ba5267dc423f4f20c484c49cc340d9fcf3079a28d8ce0c9e129322fbd8a995fed729ccc7167823a7

    • SSDEEP

      12288:xtH1MEahAJJ6uJoaNTTT4dSpIbGmEo6hrDbbZ8K65R7:xF1JmujPcdSSGmT6Zbd8JR7

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks