General

  • Target

    3c1da8b14ca4bc89b4efe0b019f33a96214bd9a11bd54806a0150662da200d2bN.exe

  • Size

    414KB

  • Sample

    241115-r1195ayrgj

  • MD5

    40fc922d2a6ec7f62f53ecad05f1b820

  • SHA1

    7c1e80f0a41438fd430ad275fad4e40f1a786721

  • SHA256

    3c1da8b14ca4bc89b4efe0b019f33a96214bd9a11bd54806a0150662da200d2b

  • SHA512

    513a43f00553a8749405e9ea119489f070f61e06d9edfb8d5532b5e4a3457ed028afa9a5e2918c9653c627ba8b3fa431f520338433a5dc5e46e5f90c107f80b1

  • SSDEEP

    12288:AY+g9nUppu7s+Xc7lL7X1m4ZOlDv8lbh:8u7s+Xc9xmkUUlV

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Targets

    • Target

      3c1da8b14ca4bc89b4efe0b019f33a96214bd9a11bd54806a0150662da200d2bN.exe

    • Size

      414KB

    • MD5

      40fc922d2a6ec7f62f53ecad05f1b820

    • SHA1

      7c1e80f0a41438fd430ad275fad4e40f1a786721

    • SHA256

      3c1da8b14ca4bc89b4efe0b019f33a96214bd9a11bd54806a0150662da200d2b

    • SHA512

      513a43f00553a8749405e9ea119489f070f61e06d9edfb8d5532b5e4a3457ed028afa9a5e2918c9653c627ba8b3fa431f520338433a5dc5e46e5f90c107f80b1

    • SSDEEP

      12288:AY+g9nUppu7s+Xc7lL7X1m4ZOlDv8lbh:8u7s+Xc9xmkUUlV

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks