General

  • Target

    73c153df23bf274f53685675b93d24cfe27d55caeca1ebb7a831b8cdda176c9c

  • Size

    449KB

  • Sample

    220326-jmxe1sabe9

  • MD5

    435d784ef19c27df502b9f8a8f9959c9

  • SHA1

    588192db95661f76678b41bb702bc5aecbe9e687

  • SHA256

    73c153df23bf274f53685675b93d24cfe27d55caeca1ebb7a831b8cdda176c9c

  • SHA512

    4011571b6c691d3b6b4741ef3e4bf13d4aa17273a9c59a9326534ffbf4808bb357d2c92aecfcad30175729e1280310de32442b18f9eca9f07dfa370566f02126

Malware Config

Extracted

Family

redline

Botnet

NEW_YEAR_BTC

C2

86.105.252.12:35200

Targets

    • Target

      73c153df23bf274f53685675b93d24cfe27d55caeca1ebb7a831b8cdda176c9c

    • Size

      449KB

    • MD5

      435d784ef19c27df502b9f8a8f9959c9

    • SHA1

      588192db95661f76678b41bb702bc5aecbe9e687

    • SHA256

      73c153df23bf274f53685675b93d24cfe27d55caeca1ebb7a831b8cdda176c9c

    • SHA512

      4011571b6c691d3b6b4741ef3e4bf13d4aa17273a9c59a9326534ffbf4808bb357d2c92aecfcad30175729e1280310de32442b18f9eca9f07dfa370566f02126

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks