General

  • Target

    f9a11197284efff950f9f9ee23ef509bd810a5bf5c2c1f8c30b7cee89b628351

  • Size

    433KB

  • Sample

    241106-k6jhyazlhp

  • MD5

    ecf8c67fd8b91570b037697e3c59aa59

  • SHA1

    422da3ce18fceb1fb67ac1ef66aa05e8048626f6

  • SHA256

    f9a11197284efff950f9f9ee23ef509bd810a5bf5c2c1f8c30b7cee89b628351

  • SHA512

    2d1cb66cb2fbf4434b4ef36a3ca132b6177eda70313f51d0d2da525c90464c2f02e59d5f7be91f0bd41299b15463afe705004b89e81473f8fd588a1a4bda5a76

  • SSDEEP

    12288:e1XjK6akObaCR71RWmXgYCR7Veo8R3T/+8NpKS:eak4J1LqA9+Ch

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      f9a11197284efff950f9f9ee23ef509bd810a5bf5c2c1f8c30b7cee89b628351

    • Size

      433KB

    • MD5

      ecf8c67fd8b91570b037697e3c59aa59

    • SHA1

      422da3ce18fceb1fb67ac1ef66aa05e8048626f6

    • SHA256

      f9a11197284efff950f9f9ee23ef509bd810a5bf5c2c1f8c30b7cee89b628351

    • SHA512

      2d1cb66cb2fbf4434b4ef36a3ca132b6177eda70313f51d0d2da525c90464c2f02e59d5f7be91f0bd41299b15463afe705004b89e81473f8fd588a1a4bda5a76

    • SSDEEP

      12288:e1XjK6akObaCR71RWmXgYCR7Veo8R3T/+8NpKS:eak4J1LqA9+Ch

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks