General

  • Target

    8978ac77fcf0acbcfd44eef20ffad25b3a168fedc926f6f729060ae33c0bccdb

  • Size

    457KB

  • Sample

    220129-llsrjshgh8

  • MD5

    26be3c0c5533ffdfd776e8798d9f624b

  • SHA1

    b7015b77ac7580e7589fe09807730993f049bab7

  • SHA256

    8978ac77fcf0acbcfd44eef20ffad25b3a168fedc926f6f729060ae33c0bccdb

  • SHA512

    b6b4d121944a0f721bb5a83892020c190263f2b9222fc1151db5279922b646289d6a664500d662328af368ffcdcc3f01ce443f7d23cc9dfbbc72dc511090b59a

Malware Config

Extracted

Family

redline

Botnet

noname

C2

185.215.113.29:20819

Targets

    • Target

      8978ac77fcf0acbcfd44eef20ffad25b3a168fedc926f6f729060ae33c0bccdb

    • Size

      457KB

    • MD5

      26be3c0c5533ffdfd776e8798d9f624b

    • SHA1

      b7015b77ac7580e7589fe09807730993f049bab7

    • SHA256

      8978ac77fcf0acbcfd44eef20ffad25b3a168fedc926f6f729060ae33c0bccdb

    • SHA512

      b6b4d121944a0f721bb5a83892020c190263f2b9222fc1151db5279922b646289d6a664500d662328af368ffcdcc3f01ce443f7d23cc9dfbbc72dc511090b59a

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks