General

  • Target

    f03052f3bc41ed85092e075bc349a29ce7613f88d2af710df98a789e54179487

  • Size

    381KB

  • Sample

    211020-deq1daged2

  • MD5

    964967ea1c91d8939d24deb47635a40e

  • SHA1

    0e94fae2bf479f8df377a9e96bd002d5b6150140

  • SHA256

    f03052f3bc41ed85092e075bc349a29ce7613f88d2af710df98a789e54179487

  • SHA512

    b89156be633ab593a25308b5ae5bb735428b21b7a56d97c2511a90173d8105ec5652e81c4c5ce5fa9d34b64e0cf94c7e02ae02fea77b492000cdf34467c13d7a

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Targets

    • Target

      f03052f3bc41ed85092e075bc349a29ce7613f88d2af710df98a789e54179487

    • Size

      381KB

    • MD5

      964967ea1c91d8939d24deb47635a40e

    • SHA1

      0e94fae2bf479f8df377a9e96bd002d5b6150140

    • SHA256

      f03052f3bc41ed85092e075bc349a29ce7613f88d2af710df98a789e54179487

    • SHA512

      b89156be633ab593a25308b5ae5bb735428b21b7a56d97c2511a90173d8105ec5652e81c4c5ce5fa9d34b64e0cf94c7e02ae02fea77b492000cdf34467c13d7a

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks