General

  • Target

    3428c8840f6dbf06ae69004390c4d744b2efebc3e17bbcd85dbd19306c9f045b

  • Size

    234KB

  • Sample

    221129-1hatwsdd8s

  • MD5

    e238bf6246a8256b594f2f3ee1e6626d

  • SHA1

    a451586ba8847ff2191a2a338d87e297b5c4ffda

  • SHA256

    fdf21b2027c9f19edbb1c04427966454c1844f1219b80aac0e7934889a50fc6d

  • SHA512

    077db65e56214c6de380c11cf53b4e86d163e03c11276b8be94232fb29ae6b4898623d678bfb380006b20edee662a72465fdd6645aca7af538ca30475a96d3f8

  • SSDEEP

    6144:z3uTewS7HIdmmvtS9wltaIVVsHtE88xyNQVnG1oWJVfv:EewSMomvtQwGLtmZRi7fv

Malware Config

Extracted

Family

redline

Botnet

NewYear2023

C2

185.106.92.111:2510

Attributes
  • auth_value

    99e9bde3b38509ea98c3316cc27e6106

Targets

    • Target

      3428c8840f6dbf06ae69004390c4d744b2efebc3e17bbcd85dbd19306c9f045b

    • Size

      276KB

    • MD5

      22fb3ebdc6e9ba1428324da1473aad3c

    • SHA1

      09aba11aa42e08a9222a93eb956e5a6a655ec383

    • SHA256

      3428c8840f6dbf06ae69004390c4d744b2efebc3e17bbcd85dbd19306c9f045b

    • SHA512

      c29059eb1131ba044eef5d71c8987718427598f3741113a6528272fdb64ff96754c26b7795991cf0cdf0b5d02225fc07691e53a561457eda1f47d876bae5e72c

    • SSDEEP

      6144:m1ckWFS7HIdemvtS9wlraIjVsHtE8cxyNQV4wo3:mIFSMEmvtQwQ3t6Zuw2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks