General

  • Target

    4281e61d1f12f0fa7956de5409a318e6bc74ef13d8844fcaf9be8961f3605016

  • Size

    273KB

  • Sample

    241110-1htl1aynhl

  • MD5

    cc43b23c1ad69eabcf61379f4a0dfcfd

  • SHA1

    6e3f60ab1264cf55064a5f5664977bc97dc21c50

  • SHA256

    4281e61d1f12f0fa7956de5409a318e6bc74ef13d8844fcaf9be8961f3605016

  • SHA512

    e07d6f9c9de6e5a32f2796830dfdfb6a71bd0d0f48a61e1cdd6c9de92df9d9311ee8fd3ac20774da0bb480822dd4857d0bd0360b392cd99f3a56945e9a41446d

  • SSDEEP

    6144:cEdqL9Tqlb3UwB7AYmFMz3LeJOyPXXUJWyRveB9W9JrB:fqJTqlbEMMYmW3A9vUJWyRW67

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      4281e61d1f12f0fa7956de5409a318e6bc74ef13d8844fcaf9be8961f3605016

    • Size

      273KB

    • MD5

      cc43b23c1ad69eabcf61379f4a0dfcfd

    • SHA1

      6e3f60ab1264cf55064a5f5664977bc97dc21c50

    • SHA256

      4281e61d1f12f0fa7956de5409a318e6bc74ef13d8844fcaf9be8961f3605016

    • SHA512

      e07d6f9c9de6e5a32f2796830dfdfb6a71bd0d0f48a61e1cdd6c9de92df9d9311ee8fd3ac20774da0bb480822dd4857d0bd0360b392cd99f3a56945e9a41446d

    • SSDEEP

      6144:cEdqL9Tqlb3UwB7AYmFMz3LeJOyPXXUJWyRveB9W9JrB:fqJTqlbEMMYmW3A9vUJWyRW67

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks