General

  • Target

    50350bd740c4ed3019620481de76b838358c489081f7a7a7fbeba1cea8eab9bf

  • Size

    394KB

  • Sample

    241107-mhtp4szmbz

  • MD5

    b7a70d078c0286b2962b53bb84111089

  • SHA1

    24d1aa63f53c10af4abd9da6fab6cf0bedff0129

  • SHA256

    50350bd740c4ed3019620481de76b838358c489081f7a7a7fbeba1cea8eab9bf

  • SHA512

    0268ed3a38658df6d3bfafc1eddb6b3d037c4ba39bc4106e30e2e5af694a7152a71115e90efc6e0ff7b45664ee100d0206daa3dd4a3e5e01f101e441a9fda720

  • SSDEEP

    6144:JvY/hfaNsYeaDDHBYolh5nkRAnlEJa7xwZ124+JXerMchss+x1UkUV:iht/a3HuUMRu7xw7f+h/wss+ck

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      50350bd740c4ed3019620481de76b838358c489081f7a7a7fbeba1cea8eab9bf

    • Size

      394KB

    • MD5

      b7a70d078c0286b2962b53bb84111089

    • SHA1

      24d1aa63f53c10af4abd9da6fab6cf0bedff0129

    • SHA256

      50350bd740c4ed3019620481de76b838358c489081f7a7a7fbeba1cea8eab9bf

    • SHA512

      0268ed3a38658df6d3bfafc1eddb6b3d037c4ba39bc4106e30e2e5af694a7152a71115e90efc6e0ff7b45664ee100d0206daa3dd4a3e5e01f101e441a9fda720

    • SSDEEP

      6144:JvY/hfaNsYeaDDHBYolh5nkRAnlEJa7xwZ124+JXerMchss+x1UkUV:iht/a3HuUMRu7xw7f+h/wss+ck

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks