General

  • Target

    bbf6333049734115878e6b4be657504e87aa290da228477175963edfdb3a3051

  • Size

    482KB

  • Sample

    220326-kf9bnsaeg4

  • MD5

    36a1cc43403a58fd1e704fa35a7e4de6

  • SHA1

    b7bcc8e43ab11bdcfae71d91acbd1895e058aea1

  • SHA256

    bbf6333049734115878e6b4be657504e87aa290da228477175963edfdb3a3051

  • SHA512

    20c289d5660729bc42db81426075a17379407637f2ea1c81411249a3213d40b8ae38bd9f0f5a85ca62af6bab060b047931af4433b5febc60ba559dd9bc98c5e6

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1

C2

45.14.49.66:35200

Targets

    • Target

      bbf6333049734115878e6b4be657504e87aa290da228477175963edfdb3a3051

    • Size

      482KB

    • MD5

      36a1cc43403a58fd1e704fa35a7e4de6

    • SHA1

      b7bcc8e43ab11bdcfae71d91acbd1895e058aea1

    • SHA256

      bbf6333049734115878e6b4be657504e87aa290da228477175963edfdb3a3051

    • SHA512

      20c289d5660729bc42db81426075a17379407637f2ea1c81411249a3213d40b8ae38bd9f0f5a85ca62af6bab060b047931af4433b5febc60ba559dd9bc98c5e6

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks