General

  • Target

    27ba0ded58f58adda8603dc0518178f8fd54de65ccc526429aac07a08369f85c

  • Size

    430KB

  • Sample

    220129-2zsxgabeh6

  • MD5

    2da312785364fead8e92ff74591ac900

  • SHA1

    0b43c4346f0b91cc5e4b7fe6fd754a04c2d3d0c9

  • SHA256

    27ba0ded58f58adda8603dc0518178f8fd54de65ccc526429aac07a08369f85c

  • SHA512

    bfaf6f5fb7803dd01505ffd24a66811483b6a00c6c71ade2a5a4d0ea2cecdbcc7bd25830d70928b72d60708dabed7678a18c4dc145438987c5dca354a25bcece

Malware Config

Extracted

Family

redline

Botnet

noname

C2

185.215.113.29:20819

Targets

    • Target

      27ba0ded58f58adda8603dc0518178f8fd54de65ccc526429aac07a08369f85c

    • Size

      430KB

    • MD5

      2da312785364fead8e92ff74591ac900

    • SHA1

      0b43c4346f0b91cc5e4b7fe6fd754a04c2d3d0c9

    • SHA256

      27ba0ded58f58adda8603dc0518178f8fd54de65ccc526429aac07a08369f85c

    • SHA512

      bfaf6f5fb7803dd01505ffd24a66811483b6a00c6c71ade2a5a4d0ea2cecdbcc7bd25830d70928b72d60708dabed7678a18c4dc145438987c5dca354a25bcece

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks