General

  • Target

    a0e874ef41607e3c4d6cbc20592c429cea3012ddb0a00779b08078795ca51205

  • Size

    407KB

  • Sample

    241110-1rsfasvqhz

  • MD5

    f7a63f9e52531fb8ed2f393113dc46d7

  • SHA1

    0332e30be6b207ea7f7aae0008716bfb6559b4db

  • SHA256

    a0e874ef41607e3c4d6cbc20592c429cea3012ddb0a00779b08078795ca51205

  • SHA512

    bfb0293a2ff1348878c97f319f3a8cca8fef7ed083fdf2259c683a2cb8037cb1ca09613519c2a64ea284a9c6c4d9d8106ba30cf01e070b10ef18a9a51ecec01e

  • SSDEEP

    12288:MvN/0O4n+iLxnFs0NMOQ/Au1ngdRx3lq3q:A4n+i1yXO2lgTx3l

Malware Config

Extracted

Family

redline

Botnet

ww

C2

193.106.191.67:44400

Attributes
  • auth_value

    5a1b28ccd05953f5c3f99729c12427cc

Targets

    • Target

      a0e874ef41607e3c4d6cbc20592c429cea3012ddb0a00779b08078795ca51205

    • Size

      407KB

    • MD5

      f7a63f9e52531fb8ed2f393113dc46d7

    • SHA1

      0332e30be6b207ea7f7aae0008716bfb6559b4db

    • SHA256

      a0e874ef41607e3c4d6cbc20592c429cea3012ddb0a00779b08078795ca51205

    • SHA512

      bfb0293a2ff1348878c97f319f3a8cca8fef7ed083fdf2259c683a2cb8037cb1ca09613519c2a64ea284a9c6c4d9d8106ba30cf01e070b10ef18a9a51ecec01e

    • SSDEEP

      12288:MvN/0O4n+iLxnFs0NMOQ/Au1ngdRx3lq3q:A4n+i1yXO2lgTx3l

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks