General

  • Target

    9c1a3ee599a227b3d027f90c7a17a974025ae318ce4260277922c016afc19107N.exe

  • Size

    426KB

  • Sample

    241117-2f8htazjaz

  • MD5

    3a6e38ead50942cd23d7e9c3ddd57300

  • SHA1

    6a9e6d8e0112478c211284522cca473fb53013b0

  • SHA256

    9c1a3ee599a227b3d027f90c7a17a974025ae318ce4260277922c016afc19107

  • SHA512

    08f73b7335b6ce200c97481e04191f97e61f76e0d526aa817ba0cc10b49fbff9b7916c408873b14647374d12251c81e5cde6df4b86f99b6f0e0c227fc2e2cef1

  • SSDEEP

    12288:I1HMxOm2kAe/vPTecnAmFyCfyqbsT81u03:2s9nn1Isyb0

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Targets

    • Target

      9c1a3ee599a227b3d027f90c7a17a974025ae318ce4260277922c016afc19107N.exe

    • Size

      426KB

    • MD5

      3a6e38ead50942cd23d7e9c3ddd57300

    • SHA1

      6a9e6d8e0112478c211284522cca473fb53013b0

    • SHA256

      9c1a3ee599a227b3d027f90c7a17a974025ae318ce4260277922c016afc19107

    • SHA512

      08f73b7335b6ce200c97481e04191f97e61f76e0d526aa817ba0cc10b49fbff9b7916c408873b14647374d12251c81e5cde6df4b86f99b6f0e0c227fc2e2cef1

    • SSDEEP

      12288:I1HMxOm2kAe/vPTecnAmFyCfyqbsT81u03:2s9nn1Isyb0

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks