General

  • Target

    571f691981d027a91e21c28b7eed60e6fbfafffc7d4bddc6a16421430a9ee13f

  • Size

    305KB

  • Sample

    221207-ew37psdf49

  • MD5

    a587df4050e96aa6f4aeceeb35ad8f0f

  • SHA1

    77865b01ed344e223053d8078d9d929ecb702ad0

  • SHA256

    184246173eaf0582fc2ccf2ca1734c91bfba25233913099279310126d72ca692

  • SHA512

    e08d13c8f1800b5ef2bfd8f5301d36124d80f7dfdb227e29b891ac612228324d1b6fd9c018cf92ad1ec6201ef7d0937f5bdd5299cf79089a745469f8d15fc7a3

  • SSDEEP

    6144:zI6SOKUbz91Rx+QrcMMXfnO4ZqHaBHLu5zE7NHFWhv1rY0nbVziUL1XhECZ:MROnD7tcMMXfHEHYuGbUv1BFXL1GCZ

Malware Config

Extracted

Family

redline

Botnet

NewDef2023

C2

185.106.92.214:2510

Attributes
  • auth_value

    048f34b18865578890538db10b2e9edf

Targets

    • Target

      571f691981d027a91e21c28b7eed60e6fbfafffc7d4bddc6a16421430a9ee13f

    • Size

      403KB

    • MD5

      40069c663019903cfbc53e6f86c81380

    • SHA1

      c00eefa6059c880ecc63bebf85b002a6f7c74ac2

    • SHA256

      571f691981d027a91e21c28b7eed60e6fbfafffc7d4bddc6a16421430a9ee13f

    • SHA512

      894f7e8d78d070a169f4116743d9b89a4a60c9f478008f47b26e85e70c7c4b15b7342840671833012ffbb7afcba75251818882cdd43c0796995baf9fd1ebbf9b

    • SSDEEP

      12288:2l2GoDuP+zcMMXfbEHcuybEv11BcTDcuwVS:2l2GmuP+zcMMzcrO4uwU

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks