General

  • Target

    81e85f7db0a90c88415c1d9ca66078c7fc8bd7b122bb9658f5a823b523e0aac3

  • Size

    273KB

  • Sample

    241108-j9dw7aygmf

  • MD5

    f498e1fecf3e7ddd06749b5ecb3637b2

  • SHA1

    60ec14fc2fa747c97625ef3f971dbc7e12837cc4

  • SHA256

    81e85f7db0a90c88415c1d9ca66078c7fc8bd7b122bb9658f5a823b523e0aac3

  • SHA512

    9afb8fa55ea281e7d163d0259a1b8b9e6410f4398b61972d90ff9d0da49cead90a4772d7748b095a41cd973cba6bf7cd2175aee2aaa77d43e86b985b933db0b6

  • SSDEEP

    6144:h8qL1OPqNLpBmk+fF1FhLeVLvNE8qifYqui4nB:eqcPqNLLm1FxeV7y8FKzn

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      81e85f7db0a90c88415c1d9ca66078c7fc8bd7b122bb9658f5a823b523e0aac3

    • Size

      273KB

    • MD5

      f498e1fecf3e7ddd06749b5ecb3637b2

    • SHA1

      60ec14fc2fa747c97625ef3f971dbc7e12837cc4

    • SHA256

      81e85f7db0a90c88415c1d9ca66078c7fc8bd7b122bb9658f5a823b523e0aac3

    • SHA512

      9afb8fa55ea281e7d163d0259a1b8b9e6410f4398b61972d90ff9d0da49cead90a4772d7748b095a41cd973cba6bf7cd2175aee2aaa77d43e86b985b933db0b6

    • SSDEEP

      6144:h8qL1OPqNLpBmk+fF1FhLeVLvNE8qifYqui4nB:eqcPqNLLm1FxeV7y8FKzn

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks