General

  • Target

    512dacf0b2520d34ecbdec70af5660c2ab7383937ae7784305b14dbe11f53377

  • Size

    382KB

  • Sample

    211020-fat8caheer

  • MD5

    94f247454f7b77ecd1948ce9cdd275fc

  • SHA1

    fa01a2e18c58d582516776f557ec2024cc92cf34

  • SHA256

    512dacf0b2520d34ecbdec70af5660c2ab7383937ae7784305b14dbe11f53377

  • SHA512

    4e097c7d45f7a20473b96b47ace7d19112eba5ad844781ad748e94a3d1e43c62bc6f37014fdb5db58f126d8f59013d4e4fddfc727a6dfde5ed54e9816e1d9b27

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Targets

    • Target

      512dacf0b2520d34ecbdec70af5660c2ab7383937ae7784305b14dbe11f53377

    • Size

      382KB

    • MD5

      94f247454f7b77ecd1948ce9cdd275fc

    • SHA1

      fa01a2e18c58d582516776f557ec2024cc92cf34

    • SHA256

      512dacf0b2520d34ecbdec70af5660c2ab7383937ae7784305b14dbe11f53377

    • SHA512

      4e097c7d45f7a20473b96b47ace7d19112eba5ad844781ad748e94a3d1e43c62bc6f37014fdb5db58f126d8f59013d4e4fddfc727a6dfde5ed54e9816e1d9b27

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks