General

  • Target

    91056d7c89d22d62ca35017d6eb4465fd7e9ee8c89f7109198e04fd173428aad

  • Size

    447KB

  • Sample

    241108-krpreazbnc

  • MD5

    49f8a533e749db70c510b623360b2ab9

  • SHA1

    900e63423943951c3bdc19028fec5b910b371e82

  • SHA256

    91056d7c89d22d62ca35017d6eb4465fd7e9ee8c89f7109198e04fd173428aad

  • SHA512

    11805dc997579edcf7f8cbc5ae6d2bea116ceaddaf59a3b2f969fea1e40c5191acda0f67cf0459204f274f018f11f6c5c4e742f74823981edc216c237e93352a

  • SSDEEP

    6144:/XO7VIXtU2yzAv0SzT2pXsjPTA5zZUylECTi1zLKS2ri8Tq7Cq/O:8VIXtLyzA8SeyPTqZUylhG1zLYm8TyO

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      91056d7c89d22d62ca35017d6eb4465fd7e9ee8c89f7109198e04fd173428aad

    • Size

      447KB

    • MD5

      49f8a533e749db70c510b623360b2ab9

    • SHA1

      900e63423943951c3bdc19028fec5b910b371e82

    • SHA256

      91056d7c89d22d62ca35017d6eb4465fd7e9ee8c89f7109198e04fd173428aad

    • SHA512

      11805dc997579edcf7f8cbc5ae6d2bea116ceaddaf59a3b2f969fea1e40c5191acda0f67cf0459204f274f018f11f6c5c4e742f74823981edc216c237e93352a

    • SSDEEP

      6144:/XO7VIXtU2yzAv0SzT2pXsjPTA5zZUylECTi1zLKS2ri8Tq7Cq/O:8VIXtLyzA8SeyPTqZUylhG1zLYm8TyO

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks