General

  • Target

    6365c28ec17de49eb47385aff9e22ce178a691e360cd800eb27d09c540a11fd5

  • Size

    409KB

  • Sample

    211024-n9hycsfaaj

  • MD5

    959868fb6a63eafd661a4a22a2586707

  • SHA1

    6391009cf8f5ce5c3daf641db5325390f39d512f

  • SHA256

    6365c28ec17de49eb47385aff9e22ce178a691e360cd800eb27d09c540a11fd5

  • SHA512

    ead5eaea212244424426553de927758617ce72e0707cad44869503d4d541184fb7b8bc01f378c91f0f4577dc75bccbbaae9e5dd9f079b2174cfd5c896148bddc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Targets

    • Target

      6365c28ec17de49eb47385aff9e22ce178a691e360cd800eb27d09c540a11fd5

    • Size

      409KB

    • MD5

      959868fb6a63eafd661a4a22a2586707

    • SHA1

      6391009cf8f5ce5c3daf641db5325390f39d512f

    • SHA256

      6365c28ec17de49eb47385aff9e22ce178a691e360cd800eb27d09c540a11fd5

    • SHA512

      ead5eaea212244424426553de927758617ce72e0707cad44869503d4d541184fb7b8bc01f378c91f0f4577dc75bccbbaae9e5dd9f079b2174cfd5c896148bddc

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks