General

  • Target

    39b68cbbaee313f8f76a5787205fd70a119cfda2132c33fa34864848e0ad48c4

  • Size

    407KB

  • Sample

    220130-m73z3sacdm

  • MD5

    66713edf3db0e59cd672a31f09afd0d9

  • SHA1

    0a71d22557496b03edda0e4e5d8a3ebb0d8a8709

  • SHA256

    39b68cbbaee313f8f76a5787205fd70a119cfda2132c33fa34864848e0ad48c4

  • SHA512

    dfc1702c07dbf2e765d00e38bf4b89a8636247d567764d1b56559eedfd991b872c850d9ef8199cbb04f248c69d81d180bbf60ade4b883cbdf37db126aa71148a

Malware Config

Extracted

Family

redline

Botnet

noname

C2

185.215.113.29:20819

Targets

    • Target

      39b68cbbaee313f8f76a5787205fd70a119cfda2132c33fa34864848e0ad48c4

    • Size

      407KB

    • MD5

      66713edf3db0e59cd672a31f09afd0d9

    • SHA1

      0a71d22557496b03edda0e4e5d8a3ebb0d8a8709

    • SHA256

      39b68cbbaee313f8f76a5787205fd70a119cfda2132c33fa34864848e0ad48c4

    • SHA512

      dfc1702c07dbf2e765d00e38bf4b89a8636247d567764d1b56559eedfd991b872c850d9ef8199cbb04f248c69d81d180bbf60ade4b883cbdf37db126aa71148a

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks