General

  • Target

    18ff13deabca95159ff1c475b2290a8b7bbabf5de2edaa0fd2caa9db602a56e6.exe

  • Size

    581KB

  • Sample

    241116-wffj5svldm

  • MD5

    6a1c3b985c35ff865ef68ed11427e8d6

  • SHA1

    153a8ea3d28f83f8749ea0576710d5a026f866b2

  • SHA256

    18ff13deabca95159ff1c475b2290a8b7bbabf5de2edaa0fd2caa9db602a56e6

  • SHA512

    a933a69f4df579af43cd4d4a910aa374838c7a4cfd13d5f1b1e75edeb41eec21234d98f54b13355548acb0872aea5bc72f052fa7df3c3b28ae1886d62fa44bc6

  • SSDEEP

    12288:PvAh3cpq/5gZl2/u4RLZftnpnw/q5J2QC1Qg:nAWbZl2LfBpnw/q/27P

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Targets

    • Target

      18ff13deabca95159ff1c475b2290a8b7bbabf5de2edaa0fd2caa9db602a56e6.exe

    • Size

      581KB

    • MD5

      6a1c3b985c35ff865ef68ed11427e8d6

    • SHA1

      153a8ea3d28f83f8749ea0576710d5a026f866b2

    • SHA256

      18ff13deabca95159ff1c475b2290a8b7bbabf5de2edaa0fd2caa9db602a56e6

    • SHA512

      a933a69f4df579af43cd4d4a910aa374838c7a4cfd13d5f1b1e75edeb41eec21234d98f54b13355548acb0872aea5bc72f052fa7df3c3b28ae1886d62fa44bc6

    • SSDEEP

      12288:PvAh3cpq/5gZl2/u4RLZftnpnw/q5J2QC1Qg:nAWbZl2LfBpnw/q/27P

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks