General

  • Target

    303b5ebedbe059a94605a30a2568fc955670c522663ee0c188c66a67ab46685e

  • Size

    297KB

  • Sample

    241108-2f1szatpbk

  • MD5

    55a021e8bb1e3ab32a42213cfeb5ddba

  • SHA1

    aef1abe1d29a4d3685b21f19e9643517ad2c92af

  • SHA256

    303b5ebedbe059a94605a30a2568fc955670c522663ee0c188c66a67ab46685e

  • SHA512

    4e19ca28bc3c2905d2a0aa2f8f3ad86e1b7eeff423c5d5e409603ddd81970e0a2ef3e36339b03a09760cbc6b893eed372acaf602c9521122dd8123ecffb4abfd

  • SSDEEP

    6144:bvzGiXPoPRvZzhR9WEjQJIud9k70st5J0c8f0wPIQJ:bLGiXPoPRxYEjQJIudS0SJ0c8f0wP

Malware Config

Extracted

Family

redline

Botnet

1

C2

45.9.20.59:46287

Attributes
  • auth_value

    ec6ada170bcec2e72f0e1f3954547f73

Targets

    • Target

      303b5ebedbe059a94605a30a2568fc955670c522663ee0c188c66a67ab46685e

    • Size

      297KB

    • MD5

      55a021e8bb1e3ab32a42213cfeb5ddba

    • SHA1

      aef1abe1d29a4d3685b21f19e9643517ad2c92af

    • SHA256

      303b5ebedbe059a94605a30a2568fc955670c522663ee0c188c66a67ab46685e

    • SHA512

      4e19ca28bc3c2905d2a0aa2f8f3ad86e1b7eeff423c5d5e409603ddd81970e0a2ef3e36339b03a09760cbc6b893eed372acaf602c9521122dd8123ecffb4abfd

    • SSDEEP

      6144:bvzGiXPoPRvZzhR9WEjQJIud9k70st5J0c8f0wPIQJ:bLGiXPoPRxYEjQJIudS0SJ0c8f0wP

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks