General

  • Target

    6d68e3596e19074777bd9010157d85a7e0b5b41f17a5122ba1216bfe1574db00

  • Size

    434KB

  • Sample

    241104-qdb62szhnr

  • MD5

    49b150aa868c7c9fa6c12f3f63d37367

  • SHA1

    f0458a331e3f741b9bfed310059b5c40a897d675

  • SHA256

    6d68e3596e19074777bd9010157d85a7e0b5b41f17a5122ba1216bfe1574db00

  • SHA512

    4277a222d11a4e481d5fc6389ff848c1d23dd262a66305ddb9a13e2a82849c60ef7014e44a7453c30c09b625bc68f807933c12a35370318e4e83b605751a18d2

  • SSDEEP

    6144:MJTpi7bxjww3MK4zPcMZ4fPHsjcm8wldunH7qorYiQI/Q+VK1I:+ihF3QPXZ8sjfBlduneorYU/Q+V

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      6d68e3596e19074777bd9010157d85a7e0b5b41f17a5122ba1216bfe1574db00

    • Size

      434KB

    • MD5

      49b150aa868c7c9fa6c12f3f63d37367

    • SHA1

      f0458a331e3f741b9bfed310059b5c40a897d675

    • SHA256

      6d68e3596e19074777bd9010157d85a7e0b5b41f17a5122ba1216bfe1574db00

    • SHA512

      4277a222d11a4e481d5fc6389ff848c1d23dd262a66305ddb9a13e2a82849c60ef7014e44a7453c30c09b625bc68f807933c12a35370318e4e83b605751a18d2

    • SSDEEP

      6144:MJTpi7bxjww3MK4zPcMZ4fPHsjcm8wldunH7qorYiQI/Q+VK1I:+ihF3QPXZ8sjfBlduneorYU/Q+V

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks