General

  • Target

    18b87f1a6dad3d5150c03341000c697e1205dd63ecd1da35768bb1a9042b920a

  • Size

    457KB

  • Sample

    220129-pe75faafbl

  • MD5

    a110444ba5cf8a1a9375c61eba60aaff

  • SHA1

    ab0ece34ee1f4602d9909384842c6b7b488eb869

  • SHA256

    18b87f1a6dad3d5150c03341000c697e1205dd63ecd1da35768bb1a9042b920a

  • SHA512

    b9a9f22a1186e93870e76e85187f908f33f73901a5200c4ea096946b54d722cac852a69fff737dd32c5bbe4b9a86c5a716e586b65736b57f8a4452dad04b7b04

Malware Config

Extracted

Family

redline

Botnet

noname

C2

185.215.113.29:20819

Targets

    • Target

      18b87f1a6dad3d5150c03341000c697e1205dd63ecd1da35768bb1a9042b920a

    • Size

      457KB

    • MD5

      a110444ba5cf8a1a9375c61eba60aaff

    • SHA1

      ab0ece34ee1f4602d9909384842c6b7b488eb869

    • SHA256

      18b87f1a6dad3d5150c03341000c697e1205dd63ecd1da35768bb1a9042b920a

    • SHA512

      b9a9f22a1186e93870e76e85187f908f33f73901a5200c4ea096946b54d722cac852a69fff737dd32c5bbe4b9a86c5a716e586b65736b57f8a4452dad04b7b04

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks