General

  • Target

    173a975a57ffbef1961c867bf6c35f8bb5fc800582ddd0e8fa69132bd0fb64d8

  • Size

    405KB

  • Sample

    211020-jp8k3aggc4

  • MD5

    3f4a2c878bf992b030d8679c46fcc62e

  • SHA1

    f370544fe56979b01c2015a8d68e94ec840f874e

  • SHA256

    173a975a57ffbef1961c867bf6c35f8bb5fc800582ddd0e8fa69132bd0fb64d8

  • SHA512

    7db3744e1b637302cb7a4ac99977bfb047b986ed19cd05ed7eeeaec0ba7092f462d3ab5a73b734578345597b47625cef1c3f94ba1742f623d04c125a0385f6bc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Targets

    • Target

      173a975a57ffbef1961c867bf6c35f8bb5fc800582ddd0e8fa69132bd0fb64d8

    • Size

      405KB

    • MD5

      3f4a2c878bf992b030d8679c46fcc62e

    • SHA1

      f370544fe56979b01c2015a8d68e94ec840f874e

    • SHA256

      173a975a57ffbef1961c867bf6c35f8bb5fc800582ddd0e8fa69132bd0fb64d8

    • SHA512

      7db3744e1b637302cb7a4ac99977bfb047b986ed19cd05ed7eeeaec0ba7092f462d3ab5a73b734578345597b47625cef1c3f94ba1742f623d04c125a0385f6bc

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks