General

  • Target

    fb7ca1e30ee1baaef470125a55ceb9cb59b38fa46690756a718bcf4b3633c93d

  • Size

    457KB

  • Sample

    220129-vrvmrsecdr

  • MD5

    61ea949f907e9372e755713900355952

  • SHA1

    e84cb38ecd57594fad622131f6847e3565f985a7

  • SHA256

    fb7ca1e30ee1baaef470125a55ceb9cb59b38fa46690756a718bcf4b3633c93d

  • SHA512

    02f1e193f60cec19b258aea3e846a7bcd184b7142a1bb0097dea5cab3d452f58dd5d654d9782a2e1cedcb6d5a8900face500cc2cc9a774fe5d23322b90928f65

Malware Config

Extracted

Family

redline

Botnet

noname

C2

185.215.113.29:20819

Targets

    • Target

      fb7ca1e30ee1baaef470125a55ceb9cb59b38fa46690756a718bcf4b3633c93d

    • Size

      457KB

    • MD5

      61ea949f907e9372e755713900355952

    • SHA1

      e84cb38ecd57594fad622131f6847e3565f985a7

    • SHA256

      fb7ca1e30ee1baaef470125a55ceb9cb59b38fa46690756a718bcf4b3633c93d

    • SHA512

      02f1e193f60cec19b258aea3e846a7bcd184b7142a1bb0097dea5cab3d452f58dd5d654d9782a2e1cedcb6d5a8900face500cc2cc9a774fe5d23322b90928f65

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks