General

  • Target

    1870b9995da0d798507e5661f6dfc6ce375b97e487a2d4c0b89741a2a986ab2c

  • Size

    271KB

  • Sample

    220822-kg3khsgcb9

  • MD5

    3da910f4f25e056a9a01b7b2d5aa5aa0

  • SHA1

    ab205dcb33987681a6f8bf4c136ce8cd48d1904f

  • SHA256

    0e37f1ca54afc85e0567b0e935ab8f0dda198ff61eb4ed4829e9f996c4670fe0

  • SHA512

    b0416b17916c560849b6702e0494e53c1f6ca4051b127152edcfa3bcfd85ece1cde6bd1eb6571940b48d2eaebea03dcc1bbc697383295703531ff910c250b75c

  • SSDEEP

    6144:cFzl6rVnljQ3h02N6DEn9aogOr0hwZf92TVGK2bOEpGIml:ss1lU3wDEn9aQr0hwZYTcTbOEpGll

Malware Config

Extracted

Family

redline

Botnet

ruzki

C2

193.106.191.165:39482

Attributes
  • auth_value

    71a0558c0eea274a5bd617ea85786884

Targets

    • Target

      1870b9995da0d798507e5661f6dfc6ce375b97e487a2d4c0b89741a2a986ab2c

    • Size

      352KB

    • MD5

      312096992dabaa78f39001149136f69f

    • SHA1

      f95fccb283b6da9e0dc22f39e9a72b540e1f1445

    • SHA256

      1870b9995da0d798507e5661f6dfc6ce375b97e487a2d4c0b89741a2a986ab2c

    • SHA512

      6b531587ff25f8de76d48ee11da348dddb65411d9fd3b2958760202e812e4f9a8eed767cf55284fd50f123985e5d4a86b179258211fe74b02a8b338682185b9c

    • SSDEEP

      6144:Adp0MU+SR1Dcnwxg9DEn/aogOr0JwZf9ATVGK2bF5We++1rwVfxz:ALTjSfcfDEn/aQr0JwZWTcTbi01o

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

MITRE ATT&CK Matrix

Tasks