General

  • Target

    ed95d3fe5f6276c00c1ff303e99e70b03db58306876efb95045e30791f24650f

  • Size

    432KB

  • Sample

    241105-kaqblszqdl

  • MD5

    5848506e51205150fdf70bd8eade8b69

  • SHA1

    c95e43b980691c7ebbc6d039966c0c992fc2aa2d

  • SHA256

    ed95d3fe5f6276c00c1ff303e99e70b03db58306876efb95045e30791f24650f

  • SHA512

    b4c36c52f17a3ffa0552496814681ccfa997fb2b3930017f00f11370ad69a39c7150633d4268bf2401712f2854b4ae004dc47d99f528627545ac420bb37d0ec2

  • SSDEEP

    6144:yGO9Zbg+pdyt8LlZuPpTOl2eV7pw5fq22bM0harV83KpzZWK3g2tF0:VO91g+pdytWZucV2E3harS3KpMK3g2T

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      ed95d3fe5f6276c00c1ff303e99e70b03db58306876efb95045e30791f24650f

    • Size

      432KB

    • MD5

      5848506e51205150fdf70bd8eade8b69

    • SHA1

      c95e43b980691c7ebbc6d039966c0c992fc2aa2d

    • SHA256

      ed95d3fe5f6276c00c1ff303e99e70b03db58306876efb95045e30791f24650f

    • SHA512

      b4c36c52f17a3ffa0552496814681ccfa997fb2b3930017f00f11370ad69a39c7150633d4268bf2401712f2854b4ae004dc47d99f528627545ac420bb37d0ec2

    • SSDEEP

      6144:yGO9Zbg+pdyt8LlZuPpTOl2eV7pw5fq22bM0harV83KpzZWK3g2tF0:VO91g+pdytWZucV2E3harS3KpMK3g2T

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks