General

  • Target

    2603ab9273d5a0c37e107da53eb818f0cdc945dc4ef31500eafaede4cdecaf4e

  • Size

    359KB

  • Sample

    211022-j2vvqscbhq

  • MD5

    3fa391256aad2d46651c5efd794c6a2a

  • SHA1

    e23746def0fedef5473150b20b940ca16fa89ff8

  • SHA256

    2603ab9273d5a0c37e107da53eb818f0cdc945dc4ef31500eafaede4cdecaf4e

  • SHA512

    1858588e121551f3118309053c95d421787640579cbdd5a9ecbdbcd0576e8e724cdfff86a50e6157a354ed2fef36f41241ced3b7c9dc3135a88174e712dd26a6

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Targets

    • Target

      2603ab9273d5a0c37e107da53eb818f0cdc945dc4ef31500eafaede4cdecaf4e

    • Size

      359KB

    • MD5

      3fa391256aad2d46651c5efd794c6a2a

    • SHA1

      e23746def0fedef5473150b20b940ca16fa89ff8

    • SHA256

      2603ab9273d5a0c37e107da53eb818f0cdc945dc4ef31500eafaede4cdecaf4e

    • SHA512

      1858588e121551f3118309053c95d421787640579cbdd5a9ecbdbcd0576e8e724cdfff86a50e6157a354ed2fef36f41241ced3b7c9dc3135a88174e712dd26a6

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks