General

  • Target

    0504e4ccf0e1a2400dc739a887db09daa6df5b75168ddffb016d15682280d7de

  • Size

    419KB

  • Sample

    211022-lcgb6accep

  • MD5

    89ad105ea89439fa6727690603cc280b

  • SHA1

    4859a5f0e16618fff12882ae41bd6761bdfb5a68

  • SHA256

    0504e4ccf0e1a2400dc739a887db09daa6df5b75168ddffb016d15682280d7de

  • SHA512

    e72681def03a3b604ffb13fa848859f879d96d15a33403dd9c429f29d99ac24e13149ca5e5ed1a3935e7855ebf01d5782c70dcf9833df52335f8dbdb58ab80f1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.182:52236

Targets

    • Target

      0504e4ccf0e1a2400dc739a887db09daa6df5b75168ddffb016d15682280d7de

    • Size

      419KB

    • MD5

      89ad105ea89439fa6727690603cc280b

    • SHA1

      4859a5f0e16618fff12882ae41bd6761bdfb5a68

    • SHA256

      0504e4ccf0e1a2400dc739a887db09daa6df5b75168ddffb016d15682280d7de

    • SHA512

      e72681def03a3b604ffb13fa848859f879d96d15a33403dd9c429f29d99ac24e13149ca5e5ed1a3935e7855ebf01d5782c70dcf9833df52335f8dbdb58ab80f1

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks