General

  • Target

    45aceb9e393db0d1b4aba079bad321de2003eb400a626e5b92a1737c17c741b7

  • Size

    358KB

  • Sample

    211022-b913qabhep

  • MD5

    0d6fff225b0d435553d1b1461c36c915

  • SHA1

    3f21f072b0b77cee433a00dfa27afd8abf2736d9

  • SHA256

    45aceb9e393db0d1b4aba079bad321de2003eb400a626e5b92a1737c17c741b7

  • SHA512

    097f205992c7505a145a4ac802673638106a4798403eedb2443fc5135bf47d9a61f05c33e0261ce83a4201c247cc362dfe07ec6db6fb53dab73483148dc64e55

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Targets

    • Target

      45aceb9e393db0d1b4aba079bad321de2003eb400a626e5b92a1737c17c741b7

    • Size

      358KB

    • MD5

      0d6fff225b0d435553d1b1461c36c915

    • SHA1

      3f21f072b0b77cee433a00dfa27afd8abf2736d9

    • SHA256

      45aceb9e393db0d1b4aba079bad321de2003eb400a626e5b92a1737c17c741b7

    • SHA512

      097f205992c7505a145a4ac802673638106a4798403eedb2443fc5135bf47d9a61f05c33e0261ce83a4201c247cc362dfe07ec6db6fb53dab73483148dc64e55

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks