General

  • Target

    dddcf4aaec22d088ea56f11caa5646644ce500c7137747db21ecd343368f2182

  • Size

    445KB

  • Sample

    241110-18h8yszlbl

  • MD5

    3912e37a6dbb152641c809d0aba5dcbf

  • SHA1

    10c1e22e909091a17e4061caf39975e7826f5c62

  • SHA256

    dddcf4aaec22d088ea56f11caa5646644ce500c7137747db21ecd343368f2182

  • SHA512

    df53449c13313404a4071d2ac3029a23d798ac5593d24bc6165f166184ef9a2e24afa55e830c030c522929fede5da4dd13ce1a761b821bc67333a8619aeab20f

  • SSDEEP

    6144:Kl0lqPY5O5kTt6196AvXlyQFSWXLGIz78B/0h5chg+rQWKO:FlFO5A6eAflyQdXLGIzoB/s5chgf

Malware Config

Extracted

Family

redline

Botnet

ww

C2

45.9.20.168:46257

Attributes
  • auth_value

    5a1b28ccd05953f5c3f99729c12427cc

Targets

    • Target

      dddcf4aaec22d088ea56f11caa5646644ce500c7137747db21ecd343368f2182

    • Size

      445KB

    • MD5

      3912e37a6dbb152641c809d0aba5dcbf

    • SHA1

      10c1e22e909091a17e4061caf39975e7826f5c62

    • SHA256

      dddcf4aaec22d088ea56f11caa5646644ce500c7137747db21ecd343368f2182

    • SHA512

      df53449c13313404a4071d2ac3029a23d798ac5593d24bc6165f166184ef9a2e24afa55e830c030c522929fede5da4dd13ce1a761b821bc67333a8619aeab20f

    • SSDEEP

      6144:Kl0lqPY5O5kTt6196AvXlyQFSWXLGIz78B/0h5chg+rQWKO:FlFO5A6eAflyQdXLGIzoB/s5chgf

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks