General

  • Target

    8e871d95200a189c984a2d3328e3cfb3bbc548eb9d1f7cf2b15b187491689d30.exe

  • Size

    574KB

  • Sample

    241116-p53bwaxbmd

  • MD5

    3989026464333d842c21e1efa29d8ae9

  • SHA1

    b22e241ff528f0deaac773aef418af36aaa032ce

  • SHA256

    8e871d95200a189c984a2d3328e3cfb3bbc548eb9d1f7cf2b15b187491689d30

  • SHA512

    20b0421019f129477bf4061eb8d2e45ae42068628c637c8607694e8dece7dafec14b64cd67f921921d356d5b1ca133e270cdf140c9a92af013e1ec80eb5bb01a

  • SSDEEP

    12288:ilvTqsKami8mOB+C+uiDum8SPl/O+50NzXTKbx7SKy:ilbqbi8d+P1KjSN/z50dDKbx7Ly

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Targets

    • Target

      8e871d95200a189c984a2d3328e3cfb3bbc548eb9d1f7cf2b15b187491689d30.exe

    • Size

      574KB

    • MD5

      3989026464333d842c21e1efa29d8ae9

    • SHA1

      b22e241ff528f0deaac773aef418af36aaa032ce

    • SHA256

      8e871d95200a189c984a2d3328e3cfb3bbc548eb9d1f7cf2b15b187491689d30

    • SHA512

      20b0421019f129477bf4061eb8d2e45ae42068628c637c8607694e8dece7dafec14b64cd67f921921d356d5b1ca133e270cdf140c9a92af013e1ec80eb5bb01a

    • SSDEEP

      12288:ilvTqsKami8mOB+C+uiDum8SPl/O+50NzXTKbx7SKy:ilbqbi8d+P1KjSN/z50dDKbx7Ly

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks