General

  • Target

    6d99db45e2656988541a82b9f4cb02de.exe

  • Size

    316KB

  • Sample

    210427-1bz3labgye

  • MD5

    6d99db45e2656988541a82b9f4cb02de

  • SHA1

    32bc95be09eec43d9e52ccf2e2a7212746c03043

  • SHA256

    2e492cb7c8adba1e0e44b44c212802c8e891f0300d93060691e39f4f986da044

  • SHA512

    86629f7ce54774596c41bcc1f1cea3556bbd8601f4fcee998cacfb37c9bccdfbac2975cfbffba51d0c4cdabefd413d223a0808751f5be922b7c705aea270b2d8

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

118

C2

bumblebee2021.store:80

trusmileveneers.store:80

lazerprojekt.store:80

Targets

    • Target

      6d99db45e2656988541a82b9f4cb02de.exe

    • Size

      316KB

    • MD5

      6d99db45e2656988541a82b9f4cb02de

    • SHA1

      32bc95be09eec43d9e52ccf2e2a7212746c03043

    • SHA256

      2e492cb7c8adba1e0e44b44c212802c8e891f0300d93060691e39f4f986da044

    • SHA512

      86629f7ce54774596c41bcc1f1cea3556bbd8601f4fcee998cacfb37c9bccdfbac2975cfbffba51d0c4cdabefd413d223a0808751f5be922b7c705aea270b2d8

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks