General

  • Target

    00db626500dfa564b851e94d41e46fa8642ec23ac824d29d7db63c9ab9886a4c

  • Size

    273KB

  • Sample

    241105-1jlmsaylct

  • MD5

    d5d31d27e043e38df9fd548d3470f710

  • SHA1

    3d7bac81b48555afaad129fa032198acfbb21c9d

  • SHA256

    00db626500dfa564b851e94d41e46fa8642ec23ac824d29d7db63c9ab9886a4c

  • SHA512

    5da71e5cec6bb03a92261160551babacd796145ab86c1b47eee7bdcbc4423a1ed1d2a98639fd83358da2c6cd84bc0b7b431a3f2e008d451e5a8cf3876d778aaa

  • SSDEEP

    6144:bdqL9TqYimTVI7rSr3n8NJpH0HtDZkuuIgZuUjptNrmCdT6VwLB:ZqJTq0TwQ8NJpH0NFkuyN9frmCde6L

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      00db626500dfa564b851e94d41e46fa8642ec23ac824d29d7db63c9ab9886a4c

    • Size

      273KB

    • MD5

      d5d31d27e043e38df9fd548d3470f710

    • SHA1

      3d7bac81b48555afaad129fa032198acfbb21c9d

    • SHA256

      00db626500dfa564b851e94d41e46fa8642ec23ac824d29d7db63c9ab9886a4c

    • SHA512

      5da71e5cec6bb03a92261160551babacd796145ab86c1b47eee7bdcbc4423a1ed1d2a98639fd83358da2c6cd84bc0b7b431a3f2e008d451e5a8cf3876d778aaa

    • SSDEEP

      6144:bdqL9TqYimTVI7rSr3n8NJpH0HtDZkuuIgZuUjptNrmCdT6VwLB:ZqJTq0TwQ8NJpH0NFkuyN9frmCde6L

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks