General

  • Target

    a9d1fe251079ca435d348f5edbd44d8ccce652a6b04514cdd8b6250eb792b394

  • Size

    432KB

  • Sample

    241106-w4hdmswbqp

  • MD5

    fd0f659aec064a69108dfc5a02315c35

  • SHA1

    dcaacc3f3dec4a8f57205428a4f88e99145a1fc6

  • SHA256

    a9d1fe251079ca435d348f5edbd44d8ccce652a6b04514cdd8b6250eb792b394

  • SHA512

    bb81df22b6559858657096b2186e07c6f1d5ed217f5f36ea6805ff549b85c71d4ad2d8d1a167f1ad483160162d50d7462e5d7566f1020959060cf391ca9b3cda

  • SSDEEP

    6144:JegQHXT3Kt595Gwa3jL/fhaCkIfyOR0iNHxzjK3mdDqkGs/QAB:J6Dat56webfhaCkIfldHxzm3mdVGs/Q

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      a9d1fe251079ca435d348f5edbd44d8ccce652a6b04514cdd8b6250eb792b394

    • Size

      432KB

    • MD5

      fd0f659aec064a69108dfc5a02315c35

    • SHA1

      dcaacc3f3dec4a8f57205428a4f88e99145a1fc6

    • SHA256

      a9d1fe251079ca435d348f5edbd44d8ccce652a6b04514cdd8b6250eb792b394

    • SHA512

      bb81df22b6559858657096b2186e07c6f1d5ed217f5f36ea6805ff549b85c71d4ad2d8d1a167f1ad483160162d50d7462e5d7566f1020959060cf391ca9b3cda

    • SSDEEP

      6144:JegQHXT3Kt595Gwa3jL/fhaCkIfyOR0iNHxzjK3mdDqkGs/QAB:J6Dat56webfhaCkIfldHxzm3mdVGs/Q

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks