General

  • Target

    a734887a6101cb6d0c9e81c5a6036be667a41a2f962a7eed30be0ff56b5210f7

  • Size

    302KB

  • Sample

    241109-dkpdqsynap

  • MD5

    ce89c47648615c4ce3a3f0dfa0a9596a

  • SHA1

    9c913dbc57f50b77de83c9a67ffd78b59e90f9a8

  • SHA256

    a734887a6101cb6d0c9e81c5a6036be667a41a2f962a7eed30be0ff56b5210f7

  • SHA512

    e40a9d286709c21825df9c5f9194cd1cc608f8942ac0ac326e2fd582b6859b50436c691b7ecc6ae6136944b5b5b9048cdfe32359c8ac1ecdf066dd4a30cf56e8

  • SSDEEP

    3072:l8XLArFsh796WIYCt9ouTDXV1lIYNbMFjwBc5wbfRny9F4znqpN1tT+3QcxH2ocC:lpCTw9ouTDljIYpcwcgCm2Z7AiC6SQ

Malware Config

Extracted

Family

redline

Botnet

11

C2

45.9.20.157:46257

Attributes
  • auth_value

    344c26d7f808f9c29e47633026f19aa5

Targets

    • Target

      a734887a6101cb6d0c9e81c5a6036be667a41a2f962a7eed30be0ff56b5210f7

    • Size

      302KB

    • MD5

      ce89c47648615c4ce3a3f0dfa0a9596a

    • SHA1

      9c913dbc57f50b77de83c9a67ffd78b59e90f9a8

    • SHA256

      a734887a6101cb6d0c9e81c5a6036be667a41a2f962a7eed30be0ff56b5210f7

    • SHA512

      e40a9d286709c21825df9c5f9194cd1cc608f8942ac0ac326e2fd582b6859b50436c691b7ecc6ae6136944b5b5b9048cdfe32359c8ac1ecdf066dd4a30cf56e8

    • SSDEEP

      3072:l8XLArFsh796WIYCt9ouTDXV1lIYNbMFjwBc5wbfRny9F4znqpN1tT+3QcxH2ocC:lpCTw9ouTDljIYpcwcgCm2Z7AiC6SQ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks