General

  • Target

    d69e7465ee7a39d7149d5150b79c8403.exe

  • Size

    314KB

  • Sample

    210428-yt1epzbpwa

  • MD5

    d69e7465ee7a39d7149d5150b79c8403

  • SHA1

    e8f7af0707f03e076e62c4936843a60695c1dc26

  • SHA256

    3402ccadc0caee011653d08f4c1da3c2c55fa27f0960e0e1ae83a30dda9dc472

  • SHA512

    f9678c1778f3a0b393f233e1f2ac48f05c170088598857fa863151e369e912e3b17c2c6a6d5edff9c8e56e648973cc15649117cb528e7bbd1876e5a88b0e091e

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

118

C2

bumblebee2021.store:80

trusmileveneers.store:80

lazerprojekt.store:80

Targets

    • Target

      d69e7465ee7a39d7149d5150b79c8403.exe

    • Size

      314KB

    • MD5

      d69e7465ee7a39d7149d5150b79c8403

    • SHA1

      e8f7af0707f03e076e62c4936843a60695c1dc26

    • SHA256

      3402ccadc0caee011653d08f4c1da3c2c55fa27f0960e0e1ae83a30dda9dc472

    • SHA512

      f9678c1778f3a0b393f233e1f2ac48f05c170088598857fa863151e369e912e3b17c2c6a6d5edff9c8e56e648973cc15649117cb528e7bbd1876e5a88b0e091e

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks