General

  • Target

    d0cf776ea71c1d2c10b0fe9e6da3dd3a

  • Size

    364KB

  • Sample

    211021-lyxk9sahgq

  • MD5

    d0cf776ea71c1d2c10b0fe9e6da3dd3a

  • SHA1

    483623f7a2e9f4073c25e45d72647728fe5e2cd4

  • SHA256

    d946346ab664704d592158a3ad2de706d92b9301ac95982f224f2069f39f1c2c

  • SHA512

    629e7d096a17f20ac657bd862b427ef0c9c1dd228d7e90be4b855ca561104f722bfd58e9c7a7344b5feb9e0e4f3fa3ba07bc1ee6b7c0030ad8fb26d1917307de

Malware Config

Extracted

Family

redline

Botnet

paladin

C2

188.68.201.6:10085

Targets

    • Target

      d0cf776ea71c1d2c10b0fe9e6da3dd3a

    • Size

      364KB

    • MD5

      d0cf776ea71c1d2c10b0fe9e6da3dd3a

    • SHA1

      483623f7a2e9f4073c25e45d72647728fe5e2cd4

    • SHA256

      d946346ab664704d592158a3ad2de706d92b9301ac95982f224f2069f39f1c2c

    • SHA512

      629e7d096a17f20ac657bd862b427ef0c9c1dd228d7e90be4b855ca561104f722bfd58e9c7a7344b5feb9e0e4f3fa3ba07bc1ee6b7c0030ad8fb26d1917307de

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks