General

  • Target

    9c00c9d454adb53dfa20728f100632db2953874d4b49f301bea9b5c196b62385

  • Size

    433KB

  • Sample

    241108-klen9aylat

  • MD5

    e95c1863b7dcbd48e3cfe56b7ce4bd3e

  • SHA1

    06affc3aad05450dd14d6c534e0a780160a4a24b

  • SHA256

    9c00c9d454adb53dfa20728f100632db2953874d4b49f301bea9b5c196b62385

  • SHA512

    3acf1fe9a8c15b70c75ff6786de1ee25bd692b43d32eda51442ebbb4270c5201f4c4c375bba2b67dc2e418dcab2ea0facac919477f01b57ce2793599acdc62be

  • SSDEEP

    6144:gkzT5Nf9ZbDnOgfq1HjKNi+Hn33b8poHwiMc4oKoN3:fT5XZ+gfqdjKNdHn33bAoHwQ4oKM

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      9c00c9d454adb53dfa20728f100632db2953874d4b49f301bea9b5c196b62385

    • Size

      433KB

    • MD5

      e95c1863b7dcbd48e3cfe56b7ce4bd3e

    • SHA1

      06affc3aad05450dd14d6c534e0a780160a4a24b

    • SHA256

      9c00c9d454adb53dfa20728f100632db2953874d4b49f301bea9b5c196b62385

    • SHA512

      3acf1fe9a8c15b70c75ff6786de1ee25bd692b43d32eda51442ebbb4270c5201f4c4c375bba2b67dc2e418dcab2ea0facac919477f01b57ce2793599acdc62be

    • SSDEEP

      6144:gkzT5Nf9ZbDnOgfq1HjKNi+Hn33b8poHwiMc4oKoN3:fT5XZ+gfqdjKNdHn33bAoHwQ4oKM

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks