General

  • Target

    39b42b123aa0e37be91f216cd85ef3ca8e5566719cccf6c5f35d2cfab9ad6dc5.exe

  • Size

    583KB

  • Sample

    241115-sx818swgkc

  • MD5

    4aa73f48b343959f7af4ad1138f26b46

  • SHA1

    4f9171bb3f8684ebb91bf3970fa2528c0770d418

  • SHA256

    39b42b123aa0e37be91f216cd85ef3ca8e5566719cccf6c5f35d2cfab9ad6dc5

  • SHA512

    6fa6cede2253e3ed4acf8b8398138975c68b3aca6225eda62f5a07c6812d92f83cb1e73cbbd6e7c7723a5650b42bd114e7b33ea831fd2a391d544f0f037e9fb2

  • SSDEEP

    6144:u+8ywtMOWjpbIOH1Wz/e2FzirHJtR/j58IlRIZnhmKvA25PJgpSj22LW7:R81tMOW900Wz/dFz8Hj154hmjMgSj2F

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Targets

    • Target

      39b42b123aa0e37be91f216cd85ef3ca8e5566719cccf6c5f35d2cfab9ad6dc5.exe

    • Size

      583KB

    • MD5

      4aa73f48b343959f7af4ad1138f26b46

    • SHA1

      4f9171bb3f8684ebb91bf3970fa2528c0770d418

    • SHA256

      39b42b123aa0e37be91f216cd85ef3ca8e5566719cccf6c5f35d2cfab9ad6dc5

    • SHA512

      6fa6cede2253e3ed4acf8b8398138975c68b3aca6225eda62f5a07c6812d92f83cb1e73cbbd6e7c7723a5650b42bd114e7b33ea831fd2a391d544f0f037e9fb2

    • SSDEEP

      6144:u+8ywtMOWjpbIOH1Wz/e2FzirHJtR/j58IlRIZnhmKvA25PJgpSj22LW7:R81tMOW900Wz/dFz8Hj154hmjMgSj2F

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks