General

  • Target

    f056787dad5ae5e7f867832b591216614b3d63e771cf1e70b0755adf96eea95c

  • Size

    434KB

  • Sample

    241107-nz5dls1lby

  • MD5

    35b884b3ed0d655fd0bfb2918e932efd

  • SHA1

    b045777b12037d562de0568018f7e8cfd4021d88

  • SHA256

    f056787dad5ae5e7f867832b591216614b3d63e771cf1e70b0755adf96eea95c

  • SHA512

    13685b5961f1481b4ab691b060866c7a7864c77bb32e93131e245d343f3582019b930cb079702ba8775310f94d0bda20942e5dc00527b43de5dd7b37dbe8646b

  • SSDEEP

    6144:jT+p2+wmSFThVQdmWGwMLqlhC5wvsu6GZcfo0Hz21OOuq0tc+o:Pw6FHimWrJhC5Osu6G6fo0HzLOuq0tj

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      f056787dad5ae5e7f867832b591216614b3d63e771cf1e70b0755adf96eea95c

    • Size

      434KB

    • MD5

      35b884b3ed0d655fd0bfb2918e932efd

    • SHA1

      b045777b12037d562de0568018f7e8cfd4021d88

    • SHA256

      f056787dad5ae5e7f867832b591216614b3d63e771cf1e70b0755adf96eea95c

    • SHA512

      13685b5961f1481b4ab691b060866c7a7864c77bb32e93131e245d343f3582019b930cb079702ba8775310f94d0bda20942e5dc00527b43de5dd7b37dbe8646b

    • SSDEEP

      6144:jT+p2+wmSFThVQdmWGwMLqlhC5wvsu6GZcfo0Hz21OOuq0tc+o:Pw6FHimWrJhC5Osu6G6fo0HzLOuq0tj

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks