General

  • Target

    a2c8f9426f957eb95d0b55252eef75d4b3a293c8a96dc0654f9fdf0a652e3e5f

  • Size

    373KB

  • Sample

    241105-qcaa3a1kds

  • MD5

    46a63303218949465b8f517af2fd915f

  • SHA1

    8b86fafff57034763b31d848b3f819fffaf15f79

  • SHA256

    a2c8f9426f957eb95d0b55252eef75d4b3a293c8a96dc0654f9fdf0a652e3e5f

  • SHA512

    952d7e64c8d0d1cbbcd07ba1d70efcae1f737abf3983d739db56268311a8cae4ab7777b9c1e394e36949d02f49ba99afacf18190072cfcd9f071a5f4757270ef

  • SSDEEP

    6144:Ta688uEybYLDxWM6Sv86kWw5t51fUrhFwKr4xQFmNkFVtM63oFvb7ITsqXigaXwX:Ta688yY/0M6S5kWwghO24xPKtM557R

Malware Config

Extracted

Family

redline

Botnet

1

C2

45.9.20.59:46287

Attributes
  • auth_value

    ec6ada170bcec2e72f0e1f3954547f73

Targets

    • Target

      a2c8f9426f957eb95d0b55252eef75d4b3a293c8a96dc0654f9fdf0a652e3e5f

    • Size

      373KB

    • MD5

      46a63303218949465b8f517af2fd915f

    • SHA1

      8b86fafff57034763b31d848b3f819fffaf15f79

    • SHA256

      a2c8f9426f957eb95d0b55252eef75d4b3a293c8a96dc0654f9fdf0a652e3e5f

    • SHA512

      952d7e64c8d0d1cbbcd07ba1d70efcae1f737abf3983d739db56268311a8cae4ab7777b9c1e394e36949d02f49ba99afacf18190072cfcd9f071a5f4757270ef

    • SSDEEP

      6144:Ta688uEybYLDxWM6Sv86kWw5t51fUrhFwKr4xQFmNkFVtM63oFvb7ITsqXigaXwX:Ta688yY/0M6S5kWwghO24xPKtM557R

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks