General

  • Target

    132bed6114e75ac6005fec6e3904cd29a56c2bc18e1da9d6c6ed96695a755474

  • Size

    391KB

  • Sample

    220124-k3xldsdhe5

  • MD5

    fc9d14dfef5b09a1c50400f74a21ef97

  • SHA1

    e2ff5e73ed1b7b7374da7cec148732fa88e4de90

  • SHA256

    132bed6114e75ac6005fec6e3904cd29a56c2bc18e1da9d6c6ed96695a755474

  • SHA512

    ce553bddb559faf2304464cb033578e1a6af3dfe44f1cb363d5765795546c71215e44b07d2703c9fd9cf7c6e2741c40b24932965c3031b3136861af43df351b8

Malware Config

Extracted

Family

redline

Botnet

NONAME

C2

45.9.20.111:1355

Targets

    • Target

      132bed6114e75ac6005fec6e3904cd29a56c2bc18e1da9d6c6ed96695a755474

    • Size

      391KB

    • MD5

      fc9d14dfef5b09a1c50400f74a21ef97

    • SHA1

      e2ff5e73ed1b7b7374da7cec148732fa88e4de90

    • SHA256

      132bed6114e75ac6005fec6e3904cd29a56c2bc18e1da9d6c6ed96695a755474

    • SHA512

      ce553bddb559faf2304464cb033578e1a6af3dfe44f1cb363d5765795546c71215e44b07d2703c9fd9cf7c6e2741c40b24932965c3031b3136861af43df351b8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks