General

  • Target

    ef49fafc6726f92c60edc8152a499da3f4a204bbfb9b0edabaaa370cfff64755

  • Size

    394KB

  • Sample

    241108-gwx2sswngv

  • MD5

    ab406bb675b41f09171e6b6aca11c624

  • SHA1

    1ddd53cc5e8937c42bfe0c9d4362144c4cfb3888

  • SHA256

    ef49fafc6726f92c60edc8152a499da3f4a204bbfb9b0edabaaa370cfff64755

  • SHA512

    7f4cdadbbfd3800190361a6efb887d72d17f668f0d78f4d55a851a5858f7bd473ed9972f5bf33b39a3ee56f6a4552f8a7d2cc211943949c59927d10f7c438e48

  • SSDEEP

    6144:JvY/hfaNsYeaDDHBYolh5nkRAnlEJa7xwZ124+JXerMchss+x1UkUV:iht/a3HuUMRu7xw7f+h/wss+ck

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      ef49fafc6726f92c60edc8152a499da3f4a204bbfb9b0edabaaa370cfff64755

    • Size

      394KB

    • MD5

      ab406bb675b41f09171e6b6aca11c624

    • SHA1

      1ddd53cc5e8937c42bfe0c9d4362144c4cfb3888

    • SHA256

      ef49fafc6726f92c60edc8152a499da3f4a204bbfb9b0edabaaa370cfff64755

    • SHA512

      7f4cdadbbfd3800190361a6efb887d72d17f668f0d78f4d55a851a5858f7bd473ed9972f5bf33b39a3ee56f6a4552f8a7d2cc211943949c59927d10f7c438e48

    • SSDEEP

      6144:JvY/hfaNsYeaDDHBYolh5nkRAnlEJa7xwZ124+JXerMchss+x1UkUV:iht/a3HuUMRu7xw7f+h/wss+ck

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks