General

  • Target

    2640c694829c4a7d31175c3a5b9e8c68.bin

  • Size

    307KB

  • Sample

    230206-j9rs2scg49

  • MD5

    a7af16a1ec744d9951256c1236f11815

  • SHA1

    c4b53cbbba06937a71f28d28d108cea78f914005

  • SHA256

    811e0960136eef377eb7fde1b31c8e4354363c3c3ed701e459632d93497e7322

  • SHA512

    6b55aa83ef717626fb807ee4e99dae9923bcd3d1b79ef97812d02cd438a4f36a9ad2f8ac0e6c7013ed0fc0997477c8e4b3d26e5297e1ccc425329649a774bf7e

  • SSDEEP

    6144:eoixDP6va+kUsQAPLbK7c0QpFLGMANx6T6ebAXCvmiHszUJza2To2F+7:PixDP6va+YDbK4hZGL6T6eECmcsIJzaj

Malware Config

Extracted

Family

redline

Botnet

milaf

C2

193.233.20.5:4136

Attributes
  • auth_value

    68aaee25afe3d0ae7d4db09dea02347c

Targets

    • Target

      9b937c2d0300b162822d6aefaadd4a05aa6005444a6ebb0c34be78019f50da8d.exe

    • Size

      425KB

    • MD5

      2640c694829c4a7d31175c3a5b9e8c68

    • SHA1

      42604e53f93f32a5fefacf3c0d39c9c5a3f2d66c

    • SHA256

      9b937c2d0300b162822d6aefaadd4a05aa6005444a6ebb0c34be78019f50da8d

    • SHA512

      79f3c1b93e9b382380e7cde745aa55319f2fadcfa5657cb33afc988235c78a2b20b1e662ef234d0ef28766519c19e88d61bb4fa8199386dd41d00abdd84b332e

    • SSDEEP

      12288:UUoavRFka1e7H1vwNJrodCVzWb9CJb7d5ZZ:15KPWnQMzWb9qb7d5n

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks