General

  • Target

    63732dbff29621f48f5407eee8756c2351635565acd124d1d05b76fcdf974b15

  • Size

    405KB

  • Sample

    211020-gstvzagfb9

  • MD5

    7e3578364a2673d3cb92e80782c4b4be

  • SHA1

    d11c9e2fb622c03a21078277957389c03376853b

  • SHA256

    63732dbff29621f48f5407eee8756c2351635565acd124d1d05b76fcdf974b15

  • SHA512

    8611cc98143b5840f536a35d916d5ff2f7cc72be8227b375dd77d3c96e9608568a9e91866290edb2ed2b2dd30d13e711ed4f7c4fe9314892609aaeb77fe96944

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Targets

    • Target

      63732dbff29621f48f5407eee8756c2351635565acd124d1d05b76fcdf974b15

    • Size

      405KB

    • MD5

      7e3578364a2673d3cb92e80782c4b4be

    • SHA1

      d11c9e2fb622c03a21078277957389c03376853b

    • SHA256

      63732dbff29621f48f5407eee8756c2351635565acd124d1d05b76fcdf974b15

    • SHA512

      8611cc98143b5840f536a35d916d5ff2f7cc72be8227b375dd77d3c96e9608568a9e91866290edb2ed2b2dd30d13e711ed4f7c4fe9314892609aaeb77fe96944

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks