General

  • Target

    b67d6f39dfe4e8d5c06e5475aa08172f69a79f0cea1e80d374ef00cec16770ba

  • Size

    427KB

  • Sample

    241104-yel2mswcle

  • MD5

    f27d80bb3ec0aa1c0db715ede8bbc11e

  • SHA1

    d2f266ac7618afd40648bcc6ae6078b0fc2bc7dd

  • SHA256

    b67d6f39dfe4e8d5c06e5475aa08172f69a79f0cea1e80d374ef00cec16770ba

  • SHA512

    3f8e80bf71057ee2e28d9094eb1710f4e4b9475e5d40fdf3136c4a00059166764448a008f10fc30be40d66ec519b7d34bb6348959a373f0d1e90bc064af4e2d4

  • SSDEEP

    12288:bI98VfhyNpDL3EwI6si3LbQMojbyZSnPsUx34:gx1EwNCyOP9S

Malware Config

Extracted

Family

redline

Botnet

1

C2

45.9.20.59:46287

Attributes
  • auth_value

    ec6ada170bcec2e72f0e1f3954547f73

Targets

    • Target

      b67d6f39dfe4e8d5c06e5475aa08172f69a79f0cea1e80d374ef00cec16770ba

    • Size

      427KB

    • MD5

      f27d80bb3ec0aa1c0db715ede8bbc11e

    • SHA1

      d2f266ac7618afd40648bcc6ae6078b0fc2bc7dd

    • SHA256

      b67d6f39dfe4e8d5c06e5475aa08172f69a79f0cea1e80d374ef00cec16770ba

    • SHA512

      3f8e80bf71057ee2e28d9094eb1710f4e4b9475e5d40fdf3136c4a00059166764448a008f10fc30be40d66ec519b7d34bb6348959a373f0d1e90bc064af4e2d4

    • SSDEEP

      12288:bI98VfhyNpDL3EwI6si3LbQMojbyZSnPsUx34:gx1EwNCyOP9S

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks