General

  • Target

    2def786c754d6ffad72f6237fd641df0b6545c4b1c5446ccbd53f2dfa679d386

  • Size

    273KB

  • Sample

    241106-mpjtgsyhmk

  • MD5

    db1d603a7ce91542ae424694902f5ad9

  • SHA1

    e1c1e688b441c6469bdede329c57264abb5dd8ae

  • SHA256

    2def786c754d6ffad72f6237fd641df0b6545c4b1c5446ccbd53f2dfa679d386

  • SHA512

    0e51d804fa1d58efd2d083be368d1c7014fb267c7c50df7e98c092966fde89179d7ac330b2f62d3774fe017c8566c05f3ff38801d9c7c6b395ff2a0b36ef8796

  • SSDEEP

    6144:cEdqL9Tqlb3UwB7AYmFMz3LeJOyPXXUJWyRveB9W9JrB:fqJTqlbEMMYmW3A9vUJWyRW67

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      2def786c754d6ffad72f6237fd641df0b6545c4b1c5446ccbd53f2dfa679d386

    • Size

      273KB

    • MD5

      db1d603a7ce91542ae424694902f5ad9

    • SHA1

      e1c1e688b441c6469bdede329c57264abb5dd8ae

    • SHA256

      2def786c754d6ffad72f6237fd641df0b6545c4b1c5446ccbd53f2dfa679d386

    • SHA512

      0e51d804fa1d58efd2d083be368d1c7014fb267c7c50df7e98c092966fde89179d7ac330b2f62d3774fe017c8566c05f3ff38801d9c7c6b395ff2a0b36ef8796

    • SSDEEP

      6144:cEdqL9Tqlb3UwB7AYmFMz3LeJOyPXXUJWyRveB9W9JrB:fqJTqlbEMMYmW3A9vUJWyRW67

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks