General

  • Target

    ee6d41b1c703705ff1ca699fa669c18403a67d6f3cd7d876eff5eed93dae6b23

  • Size

    538KB

  • Sample

    241114-ekysvavbjj

  • MD5

    ed34c00115055e1b42543bfa22cbcb1c

  • SHA1

    6faa84e5d0edcc9f3ccb22a06ea8a8fa7f26bb83

  • SHA256

    ee6d41b1c703705ff1ca699fa669c18403a67d6f3cd7d876eff5eed93dae6b23

  • SHA512

    1a3be956378a74a623cc5b94405cb06eb7cf8000bbdd0c9cf3fedfc6d29e543960c98c7617744b6265da02c415b306f59869ab4e525b03adfc8f45e79ba135e7

  • SSDEEP

    12288:YTtikKJgzocjjOnxWx4d65pLBS11vabZQ57QCxmba4J:Y5ilJKvOnxKfTS11d1Qn

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Targets

    • Target

      ee6d41b1c703705ff1ca699fa669c18403a67d6f3cd7d876eff5eed93dae6b23

    • Size

      538KB

    • MD5

      ed34c00115055e1b42543bfa22cbcb1c

    • SHA1

      6faa84e5d0edcc9f3ccb22a06ea8a8fa7f26bb83

    • SHA256

      ee6d41b1c703705ff1ca699fa669c18403a67d6f3cd7d876eff5eed93dae6b23

    • SHA512

      1a3be956378a74a623cc5b94405cb06eb7cf8000bbdd0c9cf3fedfc6d29e543960c98c7617744b6265da02c415b306f59869ab4e525b03adfc8f45e79ba135e7

    • SSDEEP

      12288:YTtikKJgzocjjOnxWx4d65pLBS11vabZQ57QCxmba4J:Y5ilJKvOnxKfTS11d1Qn

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks