General

  • Target

    decode_f5a6603f52d9f3101ae763b2ea5fa246d38cc261ed59e91286d0d73715b7dc08

  • Size

    174KB

  • Sample

    230907-rkrqraae47

  • MD5

    399189eae9b6422fbd75cd79c65265ee

  • SHA1

    75b866277ed1a5c3710ccf97949a8f505a847e5f

  • SHA256

    9c2afdd861c63815f2c6d6d768cdc51b7300ae180d1870ee4ecf55fadfb1b477

  • SHA512

    90e41ea7d2370ce57f6cfa0653cb56e8899d336a523a349e9cfa3c1a3dede82c199849cccb6598f26a110e67200f93abcff1b084e1d3e1ff41af8ecc4e4ca0ef

  • SSDEEP

    3072:1+q+QCHqAkI0MrYsUOVxm6usHSWE04YKw2tgFXJ58e8h8:12QIkI0MrYslyWE0j6tgFX/

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

28

C2

tttmundo2022.eastus.cloudapp.azure.com:1599

Attributes
  • auth_value

    983e23e9e7b170b1262849130091f35a

Targets

    • Target

      decode_f5a6603f52d9f3101ae763b2ea5fa246d38cc261ed59e91286d0d73715b7dc08

    • Size

      174KB

    • MD5

      399189eae9b6422fbd75cd79c65265ee

    • SHA1

      75b866277ed1a5c3710ccf97949a8f505a847e5f

    • SHA256

      9c2afdd861c63815f2c6d6d768cdc51b7300ae180d1870ee4ecf55fadfb1b477

    • SHA512

      90e41ea7d2370ce57f6cfa0653cb56e8899d336a523a349e9cfa3c1a3dede82c199849cccb6598f26a110e67200f93abcff1b084e1d3e1ff41af8ecc4e4ca0ef

    • SSDEEP

      3072:1+q+QCHqAkI0MrYsUOVxm6usHSWE04YKw2tgFXJ58e8h8:12QIkI0MrYslyWE0j6tgFX/

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

MITRE ATT&CK Matrix

Tasks