General

  • Target

    74f4bb0c5a7fc7590e0b9b4186aae310ee14717ff2eec29fc87ab136b5464430

  • Size

    410KB

  • Sample

    211024-qynetaebb3

  • MD5

    b112bf755c2af9d054e5083ee9b544ba

  • SHA1

    69b75258cc2dd6fbf3ef2752fbce117628fcea99

  • SHA256

    74f4bb0c5a7fc7590e0b9b4186aae310ee14717ff2eec29fc87ab136b5464430

  • SHA512

    282e33a385cd53aa666c7375963719214ed2f11d48a88a9836aa0fd625092860752df0efb8d7a821ea003134007cc641c168750fbd514239be952d610212df3e

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

PUB

C2

45.9.20.182:52236

Targets

    • Target

      74f4bb0c5a7fc7590e0b9b4186aae310ee14717ff2eec29fc87ab136b5464430

    • Size

      410KB

    • MD5

      b112bf755c2af9d054e5083ee9b544ba

    • SHA1

      69b75258cc2dd6fbf3ef2752fbce117628fcea99

    • SHA256

      74f4bb0c5a7fc7590e0b9b4186aae310ee14717ff2eec29fc87ab136b5464430

    • SHA512

      282e33a385cd53aa666c7375963719214ed2f11d48a88a9836aa0fd625092860752df0efb8d7a821ea003134007cc641c168750fbd514239be952d610212df3e

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks