General

  • Target

    047674c61b8c1de66d37647a11deb7637e618bcc793bfc9cb69499dcbe86f30b

  • Size

    433KB

  • Sample

    241105-n4p5gssrgn

  • MD5

    089b134d2b40e6795fbc75781099d411

  • SHA1

    a49c056e2d8160b647f24a2920ae0c974b322e30

  • SHA256

    047674c61b8c1de66d37647a11deb7637e618bcc793bfc9cb69499dcbe86f30b

  • SHA512

    02ca421d37cefdafeb29f89fbf4181a4ffa44c69c23d5f212c8304c6e02db5dc2ae34f0098a4518b07411ab4f93e922ec61930404af0d0855b7074e6e04c84a9

  • SSDEEP

    12288:e1XjK6akObaCR71RWmXgYCR7Veo8R3T/+8NpKS:eak4J1LqA9+Ch

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      047674c61b8c1de66d37647a11deb7637e618bcc793bfc9cb69499dcbe86f30b

    • Size

      433KB

    • MD5

      089b134d2b40e6795fbc75781099d411

    • SHA1

      a49c056e2d8160b647f24a2920ae0c974b322e30

    • SHA256

      047674c61b8c1de66d37647a11deb7637e618bcc793bfc9cb69499dcbe86f30b

    • SHA512

      02ca421d37cefdafeb29f89fbf4181a4ffa44c69c23d5f212c8304c6e02db5dc2ae34f0098a4518b07411ab4f93e922ec61930404af0d0855b7074e6e04c84a9

    • SSDEEP

      12288:e1XjK6akObaCR71RWmXgYCR7Veo8R3T/+8NpKS:eak4J1LqA9+Ch

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks