General

  • Target

    b676dc9ee5e08298f4be93ca9150088f320a96c481ecc9664c23d637a7b4bcc5

  • Size

    438KB

  • Sample

    220121-anxbzaceap

  • MD5

    f8e5052959d198e10a3253e0de51c830

  • SHA1

    67434bb62844c6fad0ffe00bddffa45001217e20

  • SHA256

    b676dc9ee5e08298f4be93ca9150088f320a96c481ecc9664c23d637a7b4bcc5

  • SHA512

    124101ee7e09e1815d2e18f1ea825ce354e400112623038056df672504aa1e060b7aee400b3f936abff288311e573f4e0da49dcf23802cc10f73ca16fb5a294b

Malware Config

Extracted

Family

redline

Botnet

NONAME

C2

45.9.20.111:1355

Targets

    • Target

      b676dc9ee5e08298f4be93ca9150088f320a96c481ecc9664c23d637a7b4bcc5

    • Size

      438KB

    • MD5

      f8e5052959d198e10a3253e0de51c830

    • SHA1

      67434bb62844c6fad0ffe00bddffa45001217e20

    • SHA256

      b676dc9ee5e08298f4be93ca9150088f320a96c481ecc9664c23d637a7b4bcc5

    • SHA512

      124101ee7e09e1815d2e18f1ea825ce354e400112623038056df672504aa1e060b7aee400b3f936abff288311e573f4e0da49dcf23802cc10f73ca16fb5a294b

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks