General

  • Target

    87a9c09f519402e322c48108aa2c17218f787f98f62224af2c6028e6abc7f309

  • Size

    434KB

  • Sample

    241106-vyqx6avelk

  • MD5

    732ebdf82adab7966cf017b399e5884d

  • SHA1

    07b9d334aecb7408bb5f27025df4a4f8e046a2a1

  • SHA256

    87a9c09f519402e322c48108aa2c17218f787f98f62224af2c6028e6abc7f309

  • SHA512

    0bbc39bfa2427c3dca755845e470d71a5dd08e775feae83d6cac4f51e7a68922e5c440442af0a9fcbdb3987f6a1c74876b4a68019042cf6858b972176f53f275

  • SSDEEP

    6144:IA/r6ksws1/whwnCWCDmV344pWNE20JvHoinidCso6URDkp6:J/rroDCWeW7sE20JPoinnso6UdK

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      87a9c09f519402e322c48108aa2c17218f787f98f62224af2c6028e6abc7f309

    • Size

      434KB

    • MD5

      732ebdf82adab7966cf017b399e5884d

    • SHA1

      07b9d334aecb7408bb5f27025df4a4f8e046a2a1

    • SHA256

      87a9c09f519402e322c48108aa2c17218f787f98f62224af2c6028e6abc7f309

    • SHA512

      0bbc39bfa2427c3dca755845e470d71a5dd08e775feae83d6cac4f51e7a68922e5c440442af0a9fcbdb3987f6a1c74876b4a68019042cf6858b972176f53f275

    • SSDEEP

      6144:IA/r6ksws1/whwnCWCDmV344pWNE20JvHoinidCso6URDkp6:J/rroDCWeW7sE20JPoinnso6UdK

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks