General

  • Target

    952c464b6864939f50277727e5726f5fc482a4715529bf16d74277807239db87

  • Size

    409KB

  • Sample

    211023-hvez9scbe4

  • MD5

    6fa373086a32d0229194dbef6936241c

  • SHA1

    6e6c020c370b574dd0b9a6ba32e7dc475b40963c

  • SHA256

    952c464b6864939f50277727e5726f5fc482a4715529bf16d74277807239db87

  • SHA512

    9ab2a353142820fc9348bf69b421c81318f934ccad9ce450cb00fc6a8f46431a141492acef082b0d43771d7a2c08b679cafeebc641e0bfbff17e2d385565478d

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Targets

    • Target

      952c464b6864939f50277727e5726f5fc482a4715529bf16d74277807239db87

    • Size

      409KB

    • MD5

      6fa373086a32d0229194dbef6936241c

    • SHA1

      6e6c020c370b574dd0b9a6ba32e7dc475b40963c

    • SHA256

      952c464b6864939f50277727e5726f5fc482a4715529bf16d74277807239db87

    • SHA512

      9ab2a353142820fc9348bf69b421c81318f934ccad9ce450cb00fc6a8f46431a141492acef082b0d43771d7a2c08b679cafeebc641e0bfbff17e2d385565478d

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks