General

  • Target

    6d628213ee9e7f4b670f3fa70b88b00b7cb82c71f64482b996f2be6eb8ca6305.exe

  • Size

    530KB

  • Sample

    241119-r6ecjssken

  • MD5

    7a56751138098e21c54891a118bc218e

  • SHA1

    665ed4848d74766ec370cd1f707641bbf75395ed

  • SHA256

    6d628213ee9e7f4b670f3fa70b88b00b7cb82c71f64482b996f2be6eb8ca6305

  • SHA512

    06cb8e23bfbeb9a3d9cc68a11f09b498edcde261d8b46e2387180db86c288194a311888992983307ba9ce598c50908a92e4a4dfb83e4a59e5d6f5d63bafa7bca

  • SSDEEP

    12288:oGttPn9arXxRkAdaP1WiZsCQrpNapD8KoC:tJuXxRJdaP1WiZsCQzKoC

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Targets

    • Target

      6d628213ee9e7f4b670f3fa70b88b00b7cb82c71f64482b996f2be6eb8ca6305.exe

    • Size

      530KB

    • MD5

      7a56751138098e21c54891a118bc218e

    • SHA1

      665ed4848d74766ec370cd1f707641bbf75395ed

    • SHA256

      6d628213ee9e7f4b670f3fa70b88b00b7cb82c71f64482b996f2be6eb8ca6305

    • SHA512

      06cb8e23bfbeb9a3d9cc68a11f09b498edcde261d8b46e2387180db86c288194a311888992983307ba9ce598c50908a92e4a4dfb83e4a59e5d6f5d63bafa7bca

    • SSDEEP

      12288:oGttPn9arXxRkAdaP1WiZsCQrpNapD8KoC:tJuXxRJdaP1WiZsCQzKoC

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks