General

  • Target

    f9a0d74e188f4fa9e6dfd781b761364c835c3920789fc78997d16a3a0d782a9c

  • Size

    433KB

  • Sample

    241106-lnsjkazpel

  • MD5

    9e6493eb701cacdf0fb8d59f6289b5fa

  • SHA1

    1b424d5ed72e945639bb748cd7b85cf7931c4cff

  • SHA256

    f9a0d74e188f4fa9e6dfd781b761364c835c3920789fc78997d16a3a0d782a9c

  • SHA512

    adc8ce9e430af3a0d96f47c5224ecacb0e2fd6cfb5f562f8498df5c1d6996d58974ab6b17057c640e68212a4f266c228ad527200bc67948e395440558c422be3

  • SSDEEP

    6144:AdToZq3KGUE6ySWgZk589XDR8JuLLH2PRpm7oio4AylG8Tqpx:KTn4E6y+k58dGQX2PRpm7/o4AD8Tq/

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      f9a0d74e188f4fa9e6dfd781b761364c835c3920789fc78997d16a3a0d782a9c

    • Size

      433KB

    • MD5

      9e6493eb701cacdf0fb8d59f6289b5fa

    • SHA1

      1b424d5ed72e945639bb748cd7b85cf7931c4cff

    • SHA256

      f9a0d74e188f4fa9e6dfd781b761364c835c3920789fc78997d16a3a0d782a9c

    • SHA512

      adc8ce9e430af3a0d96f47c5224ecacb0e2fd6cfb5f562f8498df5c1d6996d58974ab6b17057c640e68212a4f266c228ad527200bc67948e395440558c422be3

    • SSDEEP

      6144:AdToZq3KGUE6ySWgZk589XDR8JuLLH2PRpm7oio4AylG8Tqpx:KTn4E6y+k58dGQX2PRpm7/o4AD8Tq/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks