General

  • Target

    d6af6740325543d68e35ac6293b7b5828cebb3f54e940735439b7d347526e9b0.exe

  • Size

    438KB

  • Sample

    241119-r1fnesxhmk

  • MD5

    9bc7da2116e5320389cca70b696501f4

  • SHA1

    37a5a16b1c4d54ee079be03d8b8974c6c0a98808

  • SHA256

    d6af6740325543d68e35ac6293b7b5828cebb3f54e940735439b7d347526e9b0

  • SHA512

    93151142d1e4442e20c4f20d762478239ab65e21e5b5c0081e2e3f1af3adc9bc8fc224dd724ed6ce669399955c015c5803686a3403f614a01b238bffb60d11e0

  • SSDEEP

    6144:KYUIFJk4W+kXGEyp4+in0IoQTIsqs1r1LXsDvHCW9b5vgi5rJ6dXlVS9ONgQsFvg:kKkXGEy8sQx1rF0iC5vrlW6OdsVD0

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Targets

    • Target

      d6af6740325543d68e35ac6293b7b5828cebb3f54e940735439b7d347526e9b0.exe

    • Size

      438KB

    • MD5

      9bc7da2116e5320389cca70b696501f4

    • SHA1

      37a5a16b1c4d54ee079be03d8b8974c6c0a98808

    • SHA256

      d6af6740325543d68e35ac6293b7b5828cebb3f54e940735439b7d347526e9b0

    • SHA512

      93151142d1e4442e20c4f20d762478239ab65e21e5b5c0081e2e3f1af3adc9bc8fc224dd724ed6ce669399955c015c5803686a3403f614a01b238bffb60d11e0

    • SSDEEP

      6144:KYUIFJk4W+kXGEyp4+in0IoQTIsqs1r1LXsDvHCW9b5vgi5rJ6dXlVS9ONgQsFvg:kKkXGEy8sQx1rF0iC5vrlW6OdsVD0

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks