General

  • Target

    4b46256f8cb72c1e3231ca22a4c5165d2c8d89cb2c8b90240ca48bdd9ec31e68

  • Size

    273KB

  • Sample

    241106-xvpa9svne1

  • MD5

    65615c90e15bf81fc6bb810b9d96608a

  • SHA1

    0cbbe2d93bea23caef0e2c4dcd72f39c2c4fb687

  • SHA256

    4b46256f8cb72c1e3231ca22a4c5165d2c8d89cb2c8b90240ca48bdd9ec31e68

  • SHA512

    7c9b803fc9e30a80dfbc95febd26a440cf042a88b933c5b3d1dd989031f24434475ce25ce98d282cfefde24121fff4248bd1fa86647fa678115b404f0bd26171

  • SSDEEP

    6144:i8qL1OPq8uDd1iFrjAF8X6wca3noINCeGFwB:5qcPqFMrjAKKwcWoV6

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      4b46256f8cb72c1e3231ca22a4c5165d2c8d89cb2c8b90240ca48bdd9ec31e68

    • Size

      273KB

    • MD5

      65615c90e15bf81fc6bb810b9d96608a

    • SHA1

      0cbbe2d93bea23caef0e2c4dcd72f39c2c4fb687

    • SHA256

      4b46256f8cb72c1e3231ca22a4c5165d2c8d89cb2c8b90240ca48bdd9ec31e68

    • SHA512

      7c9b803fc9e30a80dfbc95febd26a440cf042a88b933c5b3d1dd989031f24434475ce25ce98d282cfefde24121fff4248bd1fa86647fa678115b404f0bd26171

    • SSDEEP

      6144:i8qL1OPq8uDd1iFrjAF8X6wca3noINCeGFwB:5qcPqFMrjAKKwcWoV6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks