General

  • Target

    72e48248e43272940b9a27d0c1394d4c028ef2cecae7b291d4c6746eaa7d8c04

  • Size

    423KB

  • Sample

    241105-tlrhgstlcz

  • MD5

    0ad24984b72cf59f5e0d6700cf63b0e1

  • SHA1

    9a6ebd4a2445c60a8b732696f847cfd5a730d630

  • SHA256

    72e48248e43272940b9a27d0c1394d4c028ef2cecae7b291d4c6746eaa7d8c04

  • SHA512

    3904cfbafe45207aedf1560a5802975a4014c42c7e7a4d67768181f8bbd158524ce2738717a45ee6aec7aaa79bfac54ebb40fe1a1c83c56d2a3c33650569fc8f

  • SSDEEP

    6144:XQ5ARa6ocV7kZpW6LX3Y0BxY3e2zGM/4MYmrgkN+k0DLltf3qefeh:XQORZhkZ8w3FBx2aVMYmrgkN+kgtf3

Malware Config

Extracted

Family

redline

Botnet

1

C2

45.9.20.59:46287

Attributes
  • auth_value

    ec6ada170bcec2e72f0e1f3954547f73

Targets

    • Target

      72e48248e43272940b9a27d0c1394d4c028ef2cecae7b291d4c6746eaa7d8c04

    • Size

      423KB

    • MD5

      0ad24984b72cf59f5e0d6700cf63b0e1

    • SHA1

      9a6ebd4a2445c60a8b732696f847cfd5a730d630

    • SHA256

      72e48248e43272940b9a27d0c1394d4c028ef2cecae7b291d4c6746eaa7d8c04

    • SHA512

      3904cfbafe45207aedf1560a5802975a4014c42c7e7a4d67768181f8bbd158524ce2738717a45ee6aec7aaa79bfac54ebb40fe1a1c83c56d2a3c33650569fc8f

    • SSDEEP

      6144:XQ5ARa6ocV7kZpW6LX3Y0BxY3e2zGM/4MYmrgkN+k0DLltf3qefeh:XQORZhkZ8w3FBx2aVMYmrgkN+kgtf3

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks