General

  • Target

    69c6f2bb8e748e01c03f2f5dd17b678ab0ae7788f4fa53aabb051d87061e458d

  • Size

    297KB

  • Sample

    241109-pysh4avcmh

  • MD5

    7b6fc2f7ae62643bbcde07967c861549

  • SHA1

    f441fd6e5df6469d350b4dfdabf8e93d54ad758b

  • SHA256

    69c6f2bb8e748e01c03f2f5dd17b678ab0ae7788f4fa53aabb051d87061e458d

  • SHA512

    3ab53bb6558fcc5c6f2d52dfbc0ba16b07cc1bdf80aa234bd887410ee3e828ae1b0e0debab7af53ca4811ca10b3c985252e9068b11d262ee3957e3659a699b0c

  • SSDEEP

    6144:bHX+iXvoPGKN3MYAXcK6YWo2mYLVe2PRy6u802JJs:b3+iXvoPoYISTLVHZy6zJ

Malware Config

Extracted

Family

redline

Botnet

1

C2

45.9.20.59:46287

Attributes
  • auth_value

    ec6ada170bcec2e72f0e1f3954547f73

Targets

    • Target

      69c6f2bb8e748e01c03f2f5dd17b678ab0ae7788f4fa53aabb051d87061e458d

    • Size

      297KB

    • MD5

      7b6fc2f7ae62643bbcde07967c861549

    • SHA1

      f441fd6e5df6469d350b4dfdabf8e93d54ad758b

    • SHA256

      69c6f2bb8e748e01c03f2f5dd17b678ab0ae7788f4fa53aabb051d87061e458d

    • SHA512

      3ab53bb6558fcc5c6f2d52dfbc0ba16b07cc1bdf80aa234bd887410ee3e828ae1b0e0debab7af53ca4811ca10b3c985252e9068b11d262ee3957e3659a699b0c

    • SSDEEP

      6144:bHX+iXvoPGKN3MYAXcK6YWo2mYLVe2PRy6u802JJs:b3+iXvoPoYISTLVHZy6zJ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks