General

  • Target

    2e792ab239b7f00bfcb0dc52ab0094814bcdd8920709c0e14e22777022a045cc.exe

  • Size

    479KB

  • Sample

    241115-yyx81szqaw

  • MD5

    f5a53b8d1fb7232cc42547676c98ccd7

  • SHA1

    fd8d8a7308a2cfc0099cfed6c21420ac6b0f89e9

  • SHA256

    2e792ab239b7f00bfcb0dc52ab0094814bcdd8920709c0e14e22777022a045cc

  • SHA512

    b83e4f453be6ae69b839af77d68e1e9521a424dbe48a0a0b3d81071fa8a048f52aa82a668fa705a9facab7777e81d8c31cea2a2e5b54f417e11b80f10970b5d6

  • SSDEEP

    12288:qfh7ZBZ8dfEhjLre4owlXPlB1SgPiH94oJN2:sN6dqjLrtvlflLSIc9pJc

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Targets

    • Target

      2e792ab239b7f00bfcb0dc52ab0094814bcdd8920709c0e14e22777022a045cc.exe

    • Size

      479KB

    • MD5

      f5a53b8d1fb7232cc42547676c98ccd7

    • SHA1

      fd8d8a7308a2cfc0099cfed6c21420ac6b0f89e9

    • SHA256

      2e792ab239b7f00bfcb0dc52ab0094814bcdd8920709c0e14e22777022a045cc

    • SHA512

      b83e4f453be6ae69b839af77d68e1e9521a424dbe48a0a0b3d81071fa8a048f52aa82a668fa705a9facab7777e81d8c31cea2a2e5b54f417e11b80f10970b5d6

    • SSDEEP

      12288:qfh7ZBZ8dfEhjLre4owlXPlB1SgPiH94oJN2:sN6dqjLrtvlflLSIc9pJc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks