General

  • Target

    d83b2c8a5ca23d0c1a4efe12502607b369e6a664c655c1a545a9cc921fd4f0f1

  • Size

    220KB

  • Sample

    241107-tj5mbsvhke

  • MD5

    5bd8f650908446b28256d62c60a5e481

  • SHA1

    e9dfd778bff7f2444e29cbfbc58f92d86bbe4660

  • SHA256

    d83b2c8a5ca23d0c1a4efe12502607b369e6a664c655c1a545a9cc921fd4f0f1

  • SHA512

    80ecdcf8681f38d075c12eeb4cc39c8066d22c77b07d3b804bd66eaf7050fe1a032d1fe690c06438a88825cfa6b29ccc9af37e76ac9e554d3f5fc63884b821f6

  • SSDEEP

    6144:A6hnjL+Uug8DCUv7TLCy0h7LGx+KKG8Tw:fnwDC6aLKKxTw

Malware Config

Extracted

Family

redline

Botnet

new

C2

176.113.115.16:4122

Attributes
  • auth_value

    0ae189161615f61e951d226417eab9d5

Targets

    • Target

      0ad8974967e5b040c9f112adf9ab7ad5ea091d0abd3d59972f4abe7fd3cf0e38

    • Size

      277KB

    • MD5

      fd69a92b874e4df1564fcbc05fb972d4

    • SHA1

      ca4aee836275631f0ed94d2f019434361f9e3fb9

    • SHA256

      0ad8974967e5b040c9f112adf9ab7ad5ea091d0abd3d59972f4abe7fd3cf0e38

    • SHA512

      da953427af4b9dd510ecbdfa7dd94fc149ab3459f1a7e68af362c6634b60acaee95cfa6078ea85110556bd84e03a2b73c9d9a24191e079ee57efa26520b0a58e

    • SSDEEP

      6144:zgLToS48gKjLCUug8DCMvNTLCyih7LGxabI:zg4S48P0DCO8fb

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks