General

  • Target

    57a0a8cfb5e583b0fd312057a893b5d40678d0a6b6cd579e0df57491af48c0ca

  • Size

    398KB

  • Sample

    220330-bq8y8aeag4

  • MD5

    399a850dd3d4d011aca02cbe9d56d4d7

  • SHA1

    a899e0e08606ebc454000db6d3aff644d2caeba0

  • SHA256

    57a0a8cfb5e583b0fd312057a893b5d40678d0a6b6cd579e0df57491af48c0ca

  • SHA512

    138d28ac002cf25789ef3950f6625fcddd1cadc2a0155552e1bac0c3c17054c927265a357ed4d0765f6a54802c8338da68413b6c5236aace16688055cf4adafa

Malware Config

Extracted

Family

redline

Botnet

NEW_YEAR_BTC

C2

86.105.252.12:35200

Targets

    • Target

      57a0a8cfb5e583b0fd312057a893b5d40678d0a6b6cd579e0df57491af48c0ca

    • Size

      398KB

    • MD5

      399a850dd3d4d011aca02cbe9d56d4d7

    • SHA1

      a899e0e08606ebc454000db6d3aff644d2caeba0

    • SHA256

      57a0a8cfb5e583b0fd312057a893b5d40678d0a6b6cd579e0df57491af48c0ca

    • SHA512

      138d28ac002cf25789ef3950f6625fcddd1cadc2a0155552e1bac0c3c17054c927265a357ed4d0765f6a54802c8338da68413b6c5236aace16688055cf4adafa

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks