General

  • Target

    3b58d5737e326a70330250af1e9746acebedf0a602db1f9fc38eb332ed725320

  • Size

    432KB

  • Sample

    241105-lfemqszanq

  • MD5

    93aea30b1728d1f0713d5e5da4dda977

  • SHA1

    8617a6cb5b5506d3df00012ec30a269c9917700e

  • SHA256

    3b58d5737e326a70330250af1e9746acebedf0a602db1f9fc38eb332ed725320

  • SHA512

    8684157be1e08473db8bc1a1d2973f5c39f8e51b571778c15056438179567d689ce57d103fc01994946db05518f7dc5b7458b76b4af4675d84069297b0d205a3

  • SSDEEP

    6144:JegQHXT3Kt595Gwa3jL/fhaCkIfyOR0iNHxzjK3mdDqkGs/QAB:J6Dat56webfhaCkIfldHxzm3mdVGs/Q

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      3b58d5737e326a70330250af1e9746acebedf0a602db1f9fc38eb332ed725320

    • Size

      432KB

    • MD5

      93aea30b1728d1f0713d5e5da4dda977

    • SHA1

      8617a6cb5b5506d3df00012ec30a269c9917700e

    • SHA256

      3b58d5737e326a70330250af1e9746acebedf0a602db1f9fc38eb332ed725320

    • SHA512

      8684157be1e08473db8bc1a1d2973f5c39f8e51b571778c15056438179567d689ce57d103fc01994946db05518f7dc5b7458b76b4af4675d84069297b0d205a3

    • SSDEEP

      6144:JegQHXT3Kt595Gwa3jL/fhaCkIfyOR0iNHxzjK3mdDqkGs/QAB:J6Dat56webfhaCkIfldHxzm3mdVGs/Q

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks