General

  • Target

    c4e01d7e12139c03488a0c9c6c72981a213314a59727084c070b62d75e7eaf39

  • Size

    337KB

  • Sample

    211021-pwhwwaacf3

  • MD5

    e381932c86ae626c6feae92ede5c978c

  • SHA1

    0d503737ec8f861f2a0faa77902a7acd7f96f186

  • SHA256

    c4e01d7e12139c03488a0c9c6c72981a213314a59727084c070b62d75e7eaf39

  • SHA512

    2814c6333316c77ff6f1aa36dac623138141cb3a5e08e80b6236b65170951e4efa342bd8b169a7085bccc1c576d8d41cc965707a41f50aae92ef8251b854661c

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Targets

    • Target

      c4e01d7e12139c03488a0c9c6c72981a213314a59727084c070b62d75e7eaf39

    • Size

      337KB

    • MD5

      e381932c86ae626c6feae92ede5c978c

    • SHA1

      0d503737ec8f861f2a0faa77902a7acd7f96f186

    • SHA256

      c4e01d7e12139c03488a0c9c6c72981a213314a59727084c070b62d75e7eaf39

    • SHA512

      2814c6333316c77ff6f1aa36dac623138141cb3a5e08e80b6236b65170951e4efa342bd8b169a7085bccc1c576d8d41cc965707a41f50aae92ef8251b854661c

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks