General

  • Target

    224aaf15b55c7888c9fd3528ce780e38.exe

  • Size

    307KB

  • Sample

    210423-qkpf55hvbx

  • MD5

    224aaf15b55c7888c9fd3528ce780e38

  • SHA1

    6174390a87a2cbf12c13d649c293316fecb86ca4

  • SHA256

    ca93741ba508ce6c7c159fa0e44a408b370cb1d7791de3ef82c713fb812cc098

  • SHA512

    2e02f4d74a1fae27ef33a79b43f3b97fbe1ed3a60a2e8330901e8e84eb8df67c8eb3d135fcf5e9818d9e6e233fdf776279339c3d96ce06c1971efe033615aa84

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

118

C2

bumblebee2021.store:80

trusmileveneers.store:80

lazerprojekt.store:80

Targets

    • Target

      224aaf15b55c7888c9fd3528ce780e38.exe

    • Size

      307KB

    • MD5

      224aaf15b55c7888c9fd3528ce780e38

    • SHA1

      6174390a87a2cbf12c13d649c293316fecb86ca4

    • SHA256

      ca93741ba508ce6c7c159fa0e44a408b370cb1d7791de3ef82c713fb812cc098

    • SHA512

      2e02f4d74a1fae27ef33a79b43f3b97fbe1ed3a60a2e8330901e8e84eb8df67c8eb3d135fcf5e9818d9e6e233fdf776279339c3d96ce06c1971efe033615aa84

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks