General

  • Target

    5e7ca4687f162334ccd856a46121de12975bd842e03cff4590f5c92bed081ca7

  • Size

    297KB

  • Sample

    241107-n7v5xasbmq

  • MD5

    080cdf83cf40a4c8e625ca262bcf1e96

  • SHA1

    e37e7f75e2c31dc20e66a2d9066b7cada8a286e6

  • SHA256

    5e7ca4687f162334ccd856a46121de12975bd842e03cff4590f5c92bed081ca7

  • SHA512

    5a7bb5a2553734c117ce9cd27c52d5850bb8c9183b3b88f78f1c98217e124cada94fa2e74b5ab625e28b5219a60b6e945feb825352787ca143e8d12430666af9

  • SSDEEP

    6144:bvzGiXPoPRvZzhR9WEjQJIud9k70st5J0c8f0wPIQJ:bLGiXPoPRxYEjQJIudS0SJ0c8f0wP

Malware Config

Extracted

Family

redline

Botnet

1

C2

45.9.20.59:46287

Attributes
  • auth_value

    ec6ada170bcec2e72f0e1f3954547f73

Targets

    • Target

      5e7ca4687f162334ccd856a46121de12975bd842e03cff4590f5c92bed081ca7

    • Size

      297KB

    • MD5

      080cdf83cf40a4c8e625ca262bcf1e96

    • SHA1

      e37e7f75e2c31dc20e66a2d9066b7cada8a286e6

    • SHA256

      5e7ca4687f162334ccd856a46121de12975bd842e03cff4590f5c92bed081ca7

    • SHA512

      5a7bb5a2553734c117ce9cd27c52d5850bb8c9183b3b88f78f1c98217e124cada94fa2e74b5ab625e28b5219a60b6e945feb825352787ca143e8d12430666af9

    • SSDEEP

      6144:bvzGiXPoPRvZzhR9WEjQJIud9k70st5J0c8f0wPIQJ:bLGiXPoPRxYEjQJIudS0SJ0c8f0wP

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks