General

  • Target

    be9a5900f5d7e808115f5915033dabc37799c6b70de1ee697f5ea5dca6152ded.exe

  • Size

    353KB

  • Sample

    241110-2nfg1axcrg

  • MD5

    faab0532925aef361450439ee88aa43c

  • SHA1

    1134d504b404a9766612b3d9a8397a707ec482d7

  • SHA256

    be9a5900f5d7e808115f5915033dabc37799c6b70de1ee697f5ea5dca6152ded

  • SHA512

    91a92e90af3a938d00775e8c5c64febf6fd739da02f2e02e0cb27bdcd2204044e8c1ea5fa9808e9b8555023f8db6d7dde58b300531986ec403d1ca5e6088f5cc

  • SSDEEP

    6144:2bNahhAopkhWMPP6PT+tU88NfrO2dan98J7jx6HrxZtkjtJ:2JahaoabP6PatONTzw9o4LxGtJ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      be9a5900f5d7e808115f5915033dabc37799c6b70de1ee697f5ea5dca6152ded.exe

    • Size

      353KB

    • MD5

      faab0532925aef361450439ee88aa43c

    • SHA1

      1134d504b404a9766612b3d9a8397a707ec482d7

    • SHA256

      be9a5900f5d7e808115f5915033dabc37799c6b70de1ee697f5ea5dca6152ded

    • SHA512

      91a92e90af3a938d00775e8c5c64febf6fd739da02f2e02e0cb27bdcd2204044e8c1ea5fa9808e9b8555023f8db6d7dde58b300531986ec403d1ca5e6088f5cc

    • SSDEEP

      6144:2bNahhAopkhWMPP6PT+tU88NfrO2dan98J7jx6HrxZtkjtJ:2JahaoabP6PatONTzw9o4LxGtJ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks