General

  • Target

    4abbefcd434ce1e3d21d7a51f1d84c2a3cb787c802dd5304148f049a8fe55616

  • Size

    297KB

  • Sample

    241108-vkemzavnet

  • MD5

    68dd6fd56f95b2b7d06ec90e17410d84

  • SHA1

    f136e9b7c603213ed4b7ba3f9aba5a5b91e9dbea

  • SHA256

    4abbefcd434ce1e3d21d7a51f1d84c2a3cb787c802dd5304148f049a8fe55616

  • SHA512

    1814d84c8c1a30a4493a7751e171a82b5890d55dcbc22ff4924cae68855d9da2a6958fd664ce4c21441c9507f625e033df8b5e622c16fad1bf71b5586a22eb7d

  • SSDEEP

    6144:rvHwCMbovQJ2lzmGk2l3u7ZOuc50Cb/7rRSUbHMfG4:rPwCMbovQJ6N3u7ZeR/7Ce

Malware Config

Extracted

Family

redline

Botnet

1

C2

45.9.20.59:46287

Attributes
  • auth_value

    ec6ada170bcec2e72f0e1f3954547f73

Targets

    • Target

      4abbefcd434ce1e3d21d7a51f1d84c2a3cb787c802dd5304148f049a8fe55616

    • Size

      297KB

    • MD5

      68dd6fd56f95b2b7d06ec90e17410d84

    • SHA1

      f136e9b7c603213ed4b7ba3f9aba5a5b91e9dbea

    • SHA256

      4abbefcd434ce1e3d21d7a51f1d84c2a3cb787c802dd5304148f049a8fe55616

    • SHA512

      1814d84c8c1a30a4493a7751e171a82b5890d55dcbc22ff4924cae68855d9da2a6958fd664ce4c21441c9507f625e033df8b5e622c16fad1bf71b5586a22eb7d

    • SSDEEP

      6144:rvHwCMbovQJ2lzmGk2l3u7ZOuc50Cb/7rRSUbHMfG4:rPwCMbovQJ6N3u7ZeR/7Ce

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks