General

  • Target

    41abf030b5bb9c7334f4e58f4b7fef007d1439d3078d07d2694e90560efcc1dbN.exe

  • Size

    589KB

  • Sample

    241116-agdlaawbpm

  • MD5

    40d5b0ee49e71e24005778a2c83a9f20

  • SHA1

    e8cc71a241b6df7618d54d22e80e1e4b41a15a52

  • SHA256

    41abf030b5bb9c7334f4e58f4b7fef007d1439d3078d07d2694e90560efcc1db

  • SHA512

    fcae9621ff5b7dfd0b92b3f080801e5bb17fa4bb83e14a13716affccd3e5e2dd4554304b89f1be2bd94e55cb97a145231f65ab15fe0613f394a6aeb4ef087de1

  • SSDEEP

    12288:17FjjiyM2OVN7/DTX87JSd9yQYEyT8IZH:xFfisOH73P90ES

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Targets

    • Target

      41abf030b5bb9c7334f4e58f4b7fef007d1439d3078d07d2694e90560efcc1dbN.exe

    • Size

      589KB

    • MD5

      40d5b0ee49e71e24005778a2c83a9f20

    • SHA1

      e8cc71a241b6df7618d54d22e80e1e4b41a15a52

    • SHA256

      41abf030b5bb9c7334f4e58f4b7fef007d1439d3078d07d2694e90560efcc1db

    • SHA512

      fcae9621ff5b7dfd0b92b3f080801e5bb17fa4bb83e14a13716affccd3e5e2dd4554304b89f1be2bd94e55cb97a145231f65ab15fe0613f394a6aeb4ef087de1

    • SSDEEP

      12288:17FjjiyM2OVN7/DTX87JSd9yQYEyT8IZH:xFfisOH73P90ES

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks