General

  • Target

    3a3349d83f36814671d498a7100c04a943d47a84ace3a30874b06da47b0c1d4e

  • Size

    445KB

  • Sample

    241110-11y97swhnb

  • MD5

    4a3b4ab4b31d7dd26cf11f421d12d0b9

  • SHA1

    a938ca8a9c5e2d0ec607c8de7d60001dd2317c22

  • SHA256

    3a3349d83f36814671d498a7100c04a943d47a84ace3a30874b06da47b0c1d4e

  • SHA512

    1c85a96e03d5bce88568f27f0c2f2cbc9588d9c04ff6b203d57b7b8747237a5142526a9387de29cf15a55410d153fc256d783bce5f092f01a70d4b9c23bd3d74

  • SSDEEP

    12288:pZIEKbCXpYrnzBXjqMTNODhCjTq3tRu5xuSr:puoX6rnzBFNruK5x1

Malware Config

Extracted

Family

redline

Botnet

ww

C2

45.9.20.168:46257

Attributes
  • auth_value

    5a1b28ccd05953f5c3f99729c12427cc

Targets

    • Target

      3a3349d83f36814671d498a7100c04a943d47a84ace3a30874b06da47b0c1d4e

    • Size

      445KB

    • MD5

      4a3b4ab4b31d7dd26cf11f421d12d0b9

    • SHA1

      a938ca8a9c5e2d0ec607c8de7d60001dd2317c22

    • SHA256

      3a3349d83f36814671d498a7100c04a943d47a84ace3a30874b06da47b0c1d4e

    • SHA512

      1c85a96e03d5bce88568f27f0c2f2cbc9588d9c04ff6b203d57b7b8747237a5142526a9387de29cf15a55410d153fc256d783bce5f092f01a70d4b9c23bd3d74

    • SSDEEP

      12288:pZIEKbCXpYrnzBXjqMTNODhCjTq3tRu5xuSr:puoX6rnzBFNruK5x1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks