General

  • Target

    9c3d73152f7158b6e4fbd689878b46770a2176cfb88f9e0cf767747796453097

  • Size

    337KB

  • Sample

    211021-tanmfsaec4

  • MD5

    abf56e40eea1b5a628907ce58513068c

  • SHA1

    897bbee7eb231fcd23d533fce1ecc1bfb5f66193

  • SHA256

    9c3d73152f7158b6e4fbd689878b46770a2176cfb88f9e0cf767747796453097

  • SHA512

    2cfc102301783c69f7cbcf6c59cc033bf4cabf228b7440b1fda80015a76b828c995f7ec8ed99e49095f1999ce3cd56dbb520277f691bf5c6eac2004d3345716a

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Targets

    • Target

      9c3d73152f7158b6e4fbd689878b46770a2176cfb88f9e0cf767747796453097

    • Size

      337KB

    • MD5

      abf56e40eea1b5a628907ce58513068c

    • SHA1

      897bbee7eb231fcd23d533fce1ecc1bfb5f66193

    • SHA256

      9c3d73152f7158b6e4fbd689878b46770a2176cfb88f9e0cf767747796453097

    • SHA512

      2cfc102301783c69f7cbcf6c59cc033bf4cabf228b7440b1fda80015a76b828c995f7ec8ed99e49095f1999ce3cd56dbb520277f691bf5c6eac2004d3345716a

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks