General

  • Target

    b1a7d09cbc9a8d66ca148dfac741d4c8e3470763fb5ac6b4e0b33192580ae0c9N.exe

  • Size

    574KB

  • Sample

    241115-3fca2svcpb

  • MD5

    76bb997c79ed1da69f00d802d66bab30

  • SHA1

    5f8dc9e85b317a927cebaee2256388528ad20a22

  • SHA256

    b1a7d09cbc9a8d66ca148dfac741d4c8e3470763fb5ac6b4e0b33192580ae0c9

  • SHA512

    644d82f03c66ee89d74a15b0e6d38e3202eef438e11fac34b0a37623ff3245e70e237d56cfe8ff948b0bf127569b9e72b23c7b413e02bb4268ee91ed40c6c9fc

  • SSDEEP

    12288:ilvTqsKami8mOB+C+uiDum8SPl/O+50NzXTKbx7SK:ilbqbi8d+P1KjSN/z50dDKbx7L

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Targets

    • Target

      b1a7d09cbc9a8d66ca148dfac741d4c8e3470763fb5ac6b4e0b33192580ae0c9N.exe

    • Size

      574KB

    • MD5

      76bb997c79ed1da69f00d802d66bab30

    • SHA1

      5f8dc9e85b317a927cebaee2256388528ad20a22

    • SHA256

      b1a7d09cbc9a8d66ca148dfac741d4c8e3470763fb5ac6b4e0b33192580ae0c9

    • SHA512

      644d82f03c66ee89d74a15b0e6d38e3202eef438e11fac34b0a37623ff3245e70e237d56cfe8ff948b0bf127569b9e72b23c7b413e02bb4268ee91ed40c6c9fc

    • SSDEEP

      12288:ilvTqsKami8mOB+C+uiDum8SPl/O+50NzXTKbx7SK:ilbqbi8d+P1KjSN/z50dDKbx7L

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks