General

  • Target

    7e5a98ef78ada64a45e323722e65d12804f166680729ffafffffaadb3f8a0d13

  • Size

    241KB

  • Sample

    241110-1d47yavndz

  • MD5

    363ba054911b5aa9941c91e33bb80290

  • SHA1

    23bd3859314e72411425aa478c736d1bbaf6c14c

  • SHA256

    7e5a98ef78ada64a45e323722e65d12804f166680729ffafffffaadb3f8a0d13

  • SHA512

    aefce2588f5a20ad6a88ce04100107434dd459ba3eb6a984d4aaf156efb72bfb80f7335a6fc2d1dcec522abfa2b00decb666e495592c1fc07cf31fd3bce5f5e6

  • SSDEEP

    6144:Hk+7jUFrzalaN/1hW/4ABlcjn1hebtbxh0Fuhpvs/y:PcxiRuj1gbpQ6k6

Malware Config

Extracted

Family

redline

Botnet

271@2023

C2

77.73.133.62:22344

Attributes
  • auth_value

    1ee05d97bb1f23e9ac01ec6d1a5f1ffb

Targets

    • Target

      c656f5bcd528544b2afd6eaa6826c7d2761daf6ab11c6f18827a8130ad643b57.exe

    • Size

      301KB

    • MD5

      19cfdc8b89749f0201fe1b75b08e62af

    • SHA1

      3b9cb2a51eeb9b1aab443782e9ba4cf6dcd3ee99

    • SHA256

      c656f5bcd528544b2afd6eaa6826c7d2761daf6ab11c6f18827a8130ad643b57

    • SHA512

      756ab92a363599d25fef77b7c90472e6e8503a4063dcc0a688e1806a721ba0db6f2aa921577dec72d878dadf87254ce3149dc92b63ca7c078524ad09202d4bdc

    • SSDEEP

      6144:rfIQZILjtE/6a8ROtdX5iunxbEv2cnd5U:rfIQZIXtUWRkxVEv2sd2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks