General

  • Target

    029c52878f535306b82e4b115636bde29161566ecdd964db2e284b1d65bff9f6.exe

  • Size

    426KB

  • Sample

    241119-lx173ateke

  • MD5

    bd2c7e558d53f3296f18564bc6f9e09d

  • SHA1

    5a39ba5058ab5bf3bab4ba618491ef34499a86b2

  • SHA256

    029c52878f535306b82e4b115636bde29161566ecdd964db2e284b1d65bff9f6

  • SHA512

    27b58eca0970ccbeafd72ac3c64fabf600f381f7be7a8bcc158c20b1b9f1828e6f6b01af81d9917a5038292736ed848bf6986c1b3d0e5eba6cb58dc227f9e4b1

  • SSDEEP

    12288:I1HMxOm2kAe/vPTecnAmFyCfyqbsT81u03U:2s9nn1Isyb0k

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Targets

    • Target

      029c52878f535306b82e4b115636bde29161566ecdd964db2e284b1d65bff9f6.exe

    • Size

      426KB

    • MD5

      bd2c7e558d53f3296f18564bc6f9e09d

    • SHA1

      5a39ba5058ab5bf3bab4ba618491ef34499a86b2

    • SHA256

      029c52878f535306b82e4b115636bde29161566ecdd964db2e284b1d65bff9f6

    • SHA512

      27b58eca0970ccbeafd72ac3c64fabf600f381f7be7a8bcc158c20b1b9f1828e6f6b01af81d9917a5038292736ed848bf6986c1b3d0e5eba6cb58dc227f9e4b1

    • SSDEEP

      12288:I1HMxOm2kAe/vPTecnAmFyCfyqbsT81u03U:2s9nn1Isyb0k

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks