General

  • Target

    1b63bed094a505c64163891fb4ce91a7f83ddd0a21eeca725a1269927cbc0f07

  • Size

    434KB

  • Sample

    241106-wshv2avejg

  • MD5

    4d268e051202a6e91975e035640c3a8c

  • SHA1

    5edc5fca21330d0a10416bc6a2192f114cd44500

  • SHA256

    1b63bed094a505c64163891fb4ce91a7f83ddd0a21eeca725a1269927cbc0f07

  • SHA512

    52ccd9225c52fe221ef6666ae00cd382b56c6fc265adcc5f3179a89b5c752bc5f85823fb8ba37de72cdc39ed33082526eefeedaf3b534332d1dd0423058b5422

  • SSDEEP

    6144:jT+p2+wmSFThVQdmWGwMLqlhC5wvsu6GZcfo0Hz21OOuq0tc+o:Pw6FHimWrJhC5Osu6G6fo0HzLOuq0tj

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      1b63bed094a505c64163891fb4ce91a7f83ddd0a21eeca725a1269927cbc0f07

    • Size

      434KB

    • MD5

      4d268e051202a6e91975e035640c3a8c

    • SHA1

      5edc5fca21330d0a10416bc6a2192f114cd44500

    • SHA256

      1b63bed094a505c64163891fb4ce91a7f83ddd0a21eeca725a1269927cbc0f07

    • SHA512

      52ccd9225c52fe221ef6666ae00cd382b56c6fc265adcc5f3179a89b5c752bc5f85823fb8ba37de72cdc39ed33082526eefeedaf3b534332d1dd0423058b5422

    • SSDEEP

      6144:jT+p2+wmSFThVQdmWGwMLqlhC5wvsu6GZcfo0Hz21OOuq0tc+o:Pw6FHimWrJhC5Osu6G6fo0HzLOuq0tj

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks