General

  • Target

    db7bfdf6c2d3e330748f3d7e6464362c1276ac1482ddcedb66a7a4f42ea6a029

  • Size

    434KB

  • Sample

    241105-2tlafasrdm

  • MD5

    c448212ff8847d0de7af2c6671c1c95b

  • SHA1

    91e480d89edf3166db9b61831320d8d74b8792ad

  • SHA256

    db7bfdf6c2d3e330748f3d7e6464362c1276ac1482ddcedb66a7a4f42ea6a029

  • SHA512

    fe9d230df66f298a0cf553d7a4d2cc13a3c87899dc677563923001830a219a951cb327a68a17f61cee9fa51ca3aef3c53c98f9a4adc06588cec02e40d04ad67d

  • SSDEEP

    12288:Yny46AqB/g47hhVOlv/L1wS3KpiT8nokS:1jR/9VDOlv/GxiTpkS

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      db7bfdf6c2d3e330748f3d7e6464362c1276ac1482ddcedb66a7a4f42ea6a029

    • Size

      434KB

    • MD5

      c448212ff8847d0de7af2c6671c1c95b

    • SHA1

      91e480d89edf3166db9b61831320d8d74b8792ad

    • SHA256

      db7bfdf6c2d3e330748f3d7e6464362c1276ac1482ddcedb66a7a4f42ea6a029

    • SHA512

      fe9d230df66f298a0cf553d7a4d2cc13a3c87899dc677563923001830a219a951cb327a68a17f61cee9fa51ca3aef3c53c98f9a4adc06588cec02e40d04ad67d

    • SSDEEP

      12288:Yny46AqB/g47hhVOlv/L1wS3KpiT8nokS:1jR/9VDOlv/GxiTpkS

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks