General

  • Target

    036760d9592d831ac020e9d49f59be5af792993d6e901292490a3ead66272dfd

  • Size

    245KB

  • Sample

    241110-3an3naxcpk

  • MD5

    3d5b2ec051e91c9c9f623ede8b608fcf

  • SHA1

    3e08a627fc9b3a0d48ace895c0fec8241493de31

  • SHA256

    036760d9592d831ac020e9d49f59be5af792993d6e901292490a3ead66272dfd

  • SHA512

    ad6c3fb02b09b0bd7f7fa6f679556c39dac7240f2a49733f94b9f18305b0615ae4a8b7a4c6c35ac5e9cf960c7a0e615c62a8df540b3d88051ea3052ca58c4a8a

  • SSDEEP

    6144:HEe+ulnTw/UR6MrdFaJYIb0mWC0KZyDFUnOdtOfGp:kvuln8/Ug6dFeWCn0DFUjfO

Malware Config

Extracted

Family

redline

Botnet

123

C2

78.153.144.3:2510

Attributes
  • auth_value

    cd6abb0af211bce081d7bf127cc26835

Targets

    • Target

      bbe934a832db11f1f3162fa27be965a88f92b8a25cfe965b6076669d3da8202e.exe

    • Size

      308KB

    • MD5

      8706078c224937bd8b44dbb986bf7ed0

    • SHA1

      1c1642d54e1370baa6b15499b56574a22dc82fcd

    • SHA256

      bbe934a832db11f1f3162fa27be965a88f92b8a25cfe965b6076669d3da8202e

    • SHA512

      7b1e2eebb61908298d1400c069a0066c92a9251e38839d64999a6d86b3b45716dca691d62a271520a30c87f561bb65fc0049a9367a49c8ebad7dbe370914e536

    • SSDEEP

      6144:eUgLpjp90jrpL6sz42bqrJiZXU+lpEoZ2v3pCLT0mY0:eUg91qjrlJzCUZXU+7E3v5CLTJP

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks