General

  • Target

    210adb77fd7478b1a522980371d31a987d43cf536ab8a4e7c8528a70c80aec6c

  • Size

    408KB

  • Sample

    220119-tpnwrsbdg4

  • MD5

    7e34b34f6742782e8757ee1a6a333b5e

  • SHA1

    20510b5bd6bf1f46917db58995b1607bf3760327

  • SHA256

    210adb77fd7478b1a522980371d31a987d43cf536ab8a4e7c8528a70c80aec6c

  • SHA512

    1a41ff1e869f39e2038c25a51347f67abad42ddbd83c809401f2337a5245243904f6482a7998d19e33edeb321c3e50199a50bf3097b6a492f12ca229e1177a3b

Malware Config

Extracted

Family

redline

Botnet

noname

C2

185.215.113.29:34865

Targets

    • Target

      210adb77fd7478b1a522980371d31a987d43cf536ab8a4e7c8528a70c80aec6c

    • Size

      408KB

    • MD5

      7e34b34f6742782e8757ee1a6a333b5e

    • SHA1

      20510b5bd6bf1f46917db58995b1607bf3760327

    • SHA256

      210adb77fd7478b1a522980371d31a987d43cf536ab8a4e7c8528a70c80aec6c

    • SHA512

      1a41ff1e869f39e2038c25a51347f67abad42ddbd83c809401f2337a5245243904f6482a7998d19e33edeb321c3e50199a50bf3097b6a492f12ca229e1177a3b

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks