General

  • Target

    6ea561719212f774beb0620e33882c2134abd04710b4dfb9d689188c856ce944

  • Size

    385KB

  • Sample

    211022-g9hh9sbbg4

  • MD5

    3aa4a2088026557af46554e2d4cb67b2

  • SHA1

    b024b4a2a7bc98229a0645cb893afb9d779f78ed

  • SHA256

    6ea561719212f774beb0620e33882c2134abd04710b4dfb9d689188c856ce944

  • SHA512

    e20d605c86ad1b30390d4a4057509d92c7032cc408f0cd366a42749af79166b341ad92858f26d60976e4095398541b9b15c59acdfcdd0dd1a27c65e634884b74

Malware Config

Extracted

Family

redline

Botnet

paladin

C2

188.68.201.6:10085

Targets

    • Target

      6ea561719212f774beb0620e33882c2134abd04710b4dfb9d689188c856ce944

    • Size

      385KB

    • MD5

      3aa4a2088026557af46554e2d4cb67b2

    • SHA1

      b024b4a2a7bc98229a0645cb893afb9d779f78ed

    • SHA256

      6ea561719212f774beb0620e33882c2134abd04710b4dfb9d689188c856ce944

    • SHA512

      e20d605c86ad1b30390d4a4057509d92c7032cc408f0cd366a42749af79166b341ad92858f26d60976e4095398541b9b15c59acdfcdd0dd1a27c65e634884b74

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks