General

  • Target

    d05de7cd5ab07d638685364c332671380f621deadd8350f861be4e2cb08fdef9

  • Size

    95KB

  • Sample

    230202-c3asmagb9x

  • MD5

    1b163caf01bbd8a7c6359042845c8038

  • SHA1

    5b7622b0e60cf100685bdf96061f250f0efcc721

  • SHA256

    d05de7cd5ab07d638685364c332671380f621deadd8350f861be4e2cb08fdef9

  • SHA512

    9d24ca38d508797493a2d83d9bcd6be53bf7439294e6ceb73e405f3c60ff94092c55d25a1df5d4934efb7bc6e6fff3724a412a54461448cea2350b004e67ea4e

  • SSDEEP

    1536:5qsCbqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2r3tmulgS6p8l:XEwiYj+zi0ZbYe1g0ujyzdr8

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

2.tcp.ngrok.io:19146

Targets

    • Target

      d05de7cd5ab07d638685364c332671380f621deadd8350f861be4e2cb08fdef9

    • Size

      95KB

    • MD5

      1b163caf01bbd8a7c6359042845c8038

    • SHA1

      5b7622b0e60cf100685bdf96061f250f0efcc721

    • SHA256

      d05de7cd5ab07d638685364c332671380f621deadd8350f861be4e2cb08fdef9

    • SHA512

      9d24ca38d508797493a2d83d9bcd6be53bf7439294e6ceb73e405f3c60ff94092c55d25a1df5d4934efb7bc6e6fff3724a412a54461448cea2350b004e67ea4e

    • SSDEEP

      1536:5qsCbqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2r3tmulgS6p8l:XEwiYj+zi0ZbYe1g0ujyzdr8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks