General

  • Target

    cbc6ed3b1da7eca8093a367463461453ca1aa9f69888fbb4d2486b5a4cd7dbf2

  • Size

    438KB

  • Sample

    220121-j85zaaedap

  • MD5

    c92f5e7329b3ff16dc251e50bbb39cf2

  • SHA1

    fe18c09efb8ebcfd28c121acf49219bd82dfe0b8

  • SHA256

    cbc6ed3b1da7eca8093a367463461453ca1aa9f69888fbb4d2486b5a4cd7dbf2

  • SHA512

    cd701ed13c0ff89fdde3fa89da8cc66275977976b358b9e03a26182f3e9366ab7c9265b7a4748b91072a55600ae4b20070de1bbc0a455c3a7e9d1f1fa452ebba

Malware Config

Extracted

Family

redline

Botnet

NONAME

C2

45.9.20.111:1355

Targets

    • Target

      cbc6ed3b1da7eca8093a367463461453ca1aa9f69888fbb4d2486b5a4cd7dbf2

    • Size

      438KB

    • MD5

      c92f5e7329b3ff16dc251e50bbb39cf2

    • SHA1

      fe18c09efb8ebcfd28c121acf49219bd82dfe0b8

    • SHA256

      cbc6ed3b1da7eca8093a367463461453ca1aa9f69888fbb4d2486b5a4cd7dbf2

    • SHA512

      cd701ed13c0ff89fdde3fa89da8cc66275977976b358b9e03a26182f3e9366ab7c9265b7a4748b91072a55600ae4b20070de1bbc0a455c3a7e9d1f1fa452ebba

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks