General

  • Target

    63b52acb6acfbc9b61d3ba817375dde21ae646b7543c538ddadbdfcf00ecf035

  • Size

    385KB

  • Sample

    211022-kycenabdd8

  • MD5

    5e7cf73e6b4a69e03ebaa9a5bb944bde

  • SHA1

    ae20ca53b3d8b795faa34175310094e500247b2b

  • SHA256

    63b52acb6acfbc9b61d3ba817375dde21ae646b7543c538ddadbdfcf00ecf035

  • SHA512

    f848a403cfa9f86660f0e84b22e27bb45c056b6073cb497051573e447152dc0688cf310237ad0c68acc98740bc91d76ea5271ee61eb20fec89b23503f3b4bbd1

Malware Config

Extracted

Family

redline

Botnet

paladin

C2

188.68.201.6:10085

Targets

    • Target

      63b52acb6acfbc9b61d3ba817375dde21ae646b7543c538ddadbdfcf00ecf035

    • Size

      385KB

    • MD5

      5e7cf73e6b4a69e03ebaa9a5bb944bde

    • SHA1

      ae20ca53b3d8b795faa34175310094e500247b2b

    • SHA256

      63b52acb6acfbc9b61d3ba817375dde21ae646b7543c538ddadbdfcf00ecf035

    • SHA512

      f848a403cfa9f86660f0e84b22e27bb45c056b6073cb497051573e447152dc0688cf310237ad0c68acc98740bc91d76ea5271ee61eb20fec89b23503f3b4bbd1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks