General

  • Target

    f8ce27a43ccecaf677abb7501aae7d7bf9481081b14686a17ffb712816c1ed31

  • Size

    405KB

  • Sample

    211020-ftstmahefn

  • MD5

    6a1e87ef2c814fe323050538c444ac37

  • SHA1

    5a9b06cd6278622f198d1acf48efef1b1dd812bb

  • SHA256

    f8ce27a43ccecaf677abb7501aae7d7bf9481081b14686a17ffb712816c1ed31

  • SHA512

    d8c89f4cdaff0887b55edf48a07dee056a1082ae450360fe85d88de1f1458a7856dadaa683075b73349c73a5a4c6764ee5a74396ec93a9ee26b02af7eb2bb778

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Targets

    • Target

      f8ce27a43ccecaf677abb7501aae7d7bf9481081b14686a17ffb712816c1ed31

    • Size

      405KB

    • MD5

      6a1e87ef2c814fe323050538c444ac37

    • SHA1

      5a9b06cd6278622f198d1acf48efef1b1dd812bb

    • SHA256

      f8ce27a43ccecaf677abb7501aae7d7bf9481081b14686a17ffb712816c1ed31

    • SHA512

      d8c89f4cdaff0887b55edf48a07dee056a1082ae450360fe85d88de1f1458a7856dadaa683075b73349c73a5a4c6764ee5a74396ec93a9ee26b02af7eb2bb778

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks