General

  • Target

    13ffd838d8c48dd70b484af8b110739afe85104722218de0ad703c1e98e42d1a

  • Size

    432KB

  • Sample

    241107-tem7gsvkcz

  • MD5

    b581edeb35283237c7267d502ade4865

  • SHA1

    ef662676ddbd511af925ca258970520a7d8acf73

  • SHA256

    13ffd838d8c48dd70b484af8b110739afe85104722218de0ad703c1e98e42d1a

  • SHA512

    f719ab1f5ef7e60c19cc39afc491789c3f319933df0441b61ce63c5e2730c7dacface78f9f296c7f8d61046b35f50f0cffd04e27d0fa17c1e8dcd186137b425f

  • SSDEEP

    6144:yGO9Zbg+pdyt8LlZuPpTOl2eV7pw5fq22bM0harV83KpzZWK3g2tF0:VO91g+pdytWZucV2E3harS3KpMK3g2T

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      13ffd838d8c48dd70b484af8b110739afe85104722218de0ad703c1e98e42d1a

    • Size

      432KB

    • MD5

      b581edeb35283237c7267d502ade4865

    • SHA1

      ef662676ddbd511af925ca258970520a7d8acf73

    • SHA256

      13ffd838d8c48dd70b484af8b110739afe85104722218de0ad703c1e98e42d1a

    • SHA512

      f719ab1f5ef7e60c19cc39afc491789c3f319933df0441b61ce63c5e2730c7dacface78f9f296c7f8d61046b35f50f0cffd04e27d0fa17c1e8dcd186137b425f

    • SSDEEP

      6144:yGO9Zbg+pdyt8LlZuPpTOl2eV7pw5fq22bM0harV83KpzZWK3g2tF0:VO91g+pdytWZucV2E3harS3KpMK3g2T

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks