General

  • Target

    ac74058b0464a2446a5065b4329904456b81230a85c0273546d1f094d55b9e62

  • Size

    432KB

  • Sample

    241107-p2yvaa1ras

  • MD5

    732dfe6142d33c30cf133d2cef715065

  • SHA1

    443c09698ad303d0ac3f78995b0eb2ab391f6786

  • SHA256

    ac74058b0464a2446a5065b4329904456b81230a85c0273546d1f094d55b9e62

  • SHA512

    e2070d6939ab3cf3beed3938dd3768ca6d8785a26f46572e39cf5dfb27c8bbb95eaf2edc0f05db7000d9bddb9455a9d58eed46102b68501c48e2f67fcf4a0315

  • SSDEEP

    6144:yGO9Zbg+pdyt8LlZuPpTOl2eV7pw5fq22bM0harV83KpzZWK3g2tF0:VO91g+pdytWZucV2E3harS3KpMK3g2T

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      ac74058b0464a2446a5065b4329904456b81230a85c0273546d1f094d55b9e62

    • Size

      432KB

    • MD5

      732dfe6142d33c30cf133d2cef715065

    • SHA1

      443c09698ad303d0ac3f78995b0eb2ab391f6786

    • SHA256

      ac74058b0464a2446a5065b4329904456b81230a85c0273546d1f094d55b9e62

    • SHA512

      e2070d6939ab3cf3beed3938dd3768ca6d8785a26f46572e39cf5dfb27c8bbb95eaf2edc0f05db7000d9bddb9455a9d58eed46102b68501c48e2f67fcf4a0315

    • SSDEEP

      6144:yGO9Zbg+pdyt8LlZuPpTOl2eV7pw5fq22bM0harV83KpzZWK3g2tF0:VO91g+pdytWZucV2E3harS3KpMK3g2T

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks