General

  • Target

    04e96715262975cd15b787ca470ea4c44a717ccdf4226b9aeb479c1effa80153

  • Size

    432KB

  • Sample

    241107-m1yrsa1drk

  • MD5

    cb0340a912cda523e522e961b50c5261

  • SHA1

    a07107dfe2349ba5d564d18d76205ff5177d5645

  • SHA256

    04e96715262975cd15b787ca470ea4c44a717ccdf4226b9aeb479c1effa80153

  • SHA512

    b8c21bfc2e8e5d4cf0e540da6c10f204f5df876391585e0032e996394be8bd4e58d2e0308d1121affef8d809ecd6eece9435c8caf168d7427fcd4a3be530a293

  • SSDEEP

    6144:JegQHXT3Kt595Gwa3jL/fhaCkIfyOR0iNHxzjK3mdDqkGs/QAB:J6Dat56webfhaCkIfldHxzm3mdVGs/Q

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      04e96715262975cd15b787ca470ea4c44a717ccdf4226b9aeb479c1effa80153

    • Size

      432KB

    • MD5

      cb0340a912cda523e522e961b50c5261

    • SHA1

      a07107dfe2349ba5d564d18d76205ff5177d5645

    • SHA256

      04e96715262975cd15b787ca470ea4c44a717ccdf4226b9aeb479c1effa80153

    • SHA512

      b8c21bfc2e8e5d4cf0e540da6c10f204f5df876391585e0032e996394be8bd4e58d2e0308d1121affef8d809ecd6eece9435c8caf168d7427fcd4a3be530a293

    • SSDEEP

      6144:JegQHXT3Kt595Gwa3jL/fhaCkIfyOR0iNHxzjK3mdDqkGs/QAB:J6Dat56webfhaCkIfldHxzm3mdVGs/Q

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks