General

  • Target

    099e18407ef82170816f3e4de6478ceaf0946ebc613bbf9bc5c1a8184b3ddb51

  • Size

    273KB

  • Sample

    241106-yrrsnawlbv

  • MD5

    25d6a8bc06aaadd9df4d931d830a379d

  • SHA1

    7f62bd09ee5b00240722ce9633f9f33a625b4b62

  • SHA256

    099e18407ef82170816f3e4de6478ceaf0946ebc613bbf9bc5c1a8184b3ddb51

  • SHA512

    1cbcf1a0b13498e93c622fb1ff7b248df163aaeda1c268df93f8234e65cdf77b24bf2cfa30b710d02c09d6981562869c85fc8bba745a98c9ba3dba931e59d2f2

  • SSDEEP

    6144:h8qL1OPqNLpBmk+fF1FhLeVLvNE8qifYqui4nB:eqcPqNLLm1FxeV7y8FKzn

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      099e18407ef82170816f3e4de6478ceaf0946ebc613bbf9bc5c1a8184b3ddb51

    • Size

      273KB

    • MD5

      25d6a8bc06aaadd9df4d931d830a379d

    • SHA1

      7f62bd09ee5b00240722ce9633f9f33a625b4b62

    • SHA256

      099e18407ef82170816f3e4de6478ceaf0946ebc613bbf9bc5c1a8184b3ddb51

    • SHA512

      1cbcf1a0b13498e93c622fb1ff7b248df163aaeda1c268df93f8234e65cdf77b24bf2cfa30b710d02c09d6981562869c85fc8bba745a98c9ba3dba931e59d2f2

    • SSDEEP

      6144:h8qL1OPqNLpBmk+fF1FhLeVLvNE8qifYqui4nB:eqcPqNLLm1FxeV7y8FKzn

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks