General

  • Target

    41c2639591ce2d67478354e09b6b9a8cbec274820dec812c6f5031ea064ca462

  • Size

    137KB

  • Sample

    221201-t7arvsbh4y

  • MD5

    fc8b5b3f8e02a4684cb688371728fad2

  • SHA1

    de2226d67afc76476284307b45ec8422ef30ceb7

  • SHA256

    41c2639591ce2d67478354e09b6b9a8cbec274820dec812c6f5031ea064ca462

  • SHA512

    0b2a701ecdc2e069ec997262b6dde496d5c9f3f514b7d88a0d5f88a300b46bd3c88ee15b7975cbc98484ec635479e18c687fddd460079f7cfd07eef3c7ade47d

  • SSDEEP

    3072:QYO/ZMTFzj+d64j7QlTeR8kNgcWFjcRPYhzSSY3:QYMZMBzj/4IVeXjpYh

Malware Config

Extracted

Family

redline

Botnet

doza

C2

31.41.244.14:4694

Attributes
  • auth_value

    3e6a3c5da2002ab5e737f7f2fc6e0cad

Targets

    • Target

      41c2639591ce2d67478354e09b6b9a8cbec274820dec812c6f5031ea064ca462

    • Size

      137KB

    • MD5

      fc8b5b3f8e02a4684cb688371728fad2

    • SHA1

      de2226d67afc76476284307b45ec8422ef30ceb7

    • SHA256

      41c2639591ce2d67478354e09b6b9a8cbec274820dec812c6f5031ea064ca462

    • SHA512

      0b2a701ecdc2e069ec997262b6dde496d5c9f3f514b7d88a0d5f88a300b46bd3c88ee15b7975cbc98484ec635479e18c687fddd460079f7cfd07eef3c7ade47d

    • SSDEEP

      3072:QYO/ZMTFzj+d64j7QlTeR8kNgcWFjcRPYhzSSY3:QYMZMBzj/4IVeXjpYh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks