General

  • Target

    1870b9995da0d798507e5661f6dfc6ce375b97e487a2d4c0b89741a2a986ab2c

  • Size

    271KB

  • Sample

    220822-q39hvagebj

  • MD5

    03d17f9ea0f36fa87428df7b4f7bb460

  • SHA1

    e72ee5ee0b22b41067d6bd5d88d7c5f3262d1c47

  • SHA256

    cc3567925087862fe31353fef36f7db39be041cdc5828f18cfb694eca6941515

  • SHA512

    deee4bddde32ae19348b948087b17e461786a6c7a269c744046adf220221f02732ff8d9a998787446346896a4560afaec3c70643db0060150a2279e92857d261

  • SSDEEP

    6144:pFzl6rVnljQ3h02N6DEn9aogOr0hwZf92TVGK2bOEpGImI:ds1lU3wDEn9aQr0hwZYTcTbOEpGlI

Malware Config

Extracted

Family

redline

Botnet

ruzki

C2

193.106.191.165:39482

Attributes
  • auth_value

    71a0558c0eea274a5bd617ea85786884

Targets

    • Target

      1870b9995da0d798507e5661f6dfc6ce375b97e487a2d4c0b89741a2a986ab2c

    • Size

      352KB

    • MD5

      312096992dabaa78f39001149136f69f

    • SHA1

      f95fccb283b6da9e0dc22f39e9a72b540e1f1445

    • SHA256

      1870b9995da0d798507e5661f6dfc6ce375b97e487a2d4c0b89741a2a986ab2c

    • SHA512

      6b531587ff25f8de76d48ee11da348dddb65411d9fd3b2958760202e812e4f9a8eed767cf55284fd50f123985e5d4a86b179258211fe74b02a8b338682185b9c

    • SSDEEP

      6144:Adp0MU+SR1Dcnwxg9DEn/aogOr0JwZf9ATVGK2bF5We++1rwVfxz:ALTjSfcfDEn/aQr0JwZWTcTbi01o

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

MITRE ATT&CK Matrix

Tasks