General

  • Target

    ffa57cbf9738b460027719c674622576fe48cc41

  • Size

    264KB

  • Sample

    241110-3ydltsyapf

  • MD5

    ecbdebd51726afcda3f4c4473af2353c

  • SHA1

    ffa57cbf9738b460027719c674622576fe48cc41

  • SHA256

    db2655fbe5948cde2a3edf0f7312f6e90916e99d2e0e58c993659c73ed015b9c

  • SHA512

    9bb2a30fe9aa66131c9a68530ddf4f1bc4869e9b44b318b204197a6c6bd0eb1e981ba9f7a23c71a904866e1b58a70ff2850f9cbca89eeaf13d73d5ebdbb5d37b

  • SSDEEP

    6144:LWswosb79M8Y0io2LCaBiL6cpJBsYVgOCI/m7NwDe2tP7VmilFxE8A:LdwoKj3ioSlcpJqY/PNDe2tTQipE5

Malware Config

Extracted

Family

redline

Botnet

Ruzki

C2

193.233.48.58:38989

Attributes
  • auth_value

    80c38cc7772c328c028b0e4f42a3fac6

Targets

    • Target

      2585fa9e70c816d66931f5dccc875327ff4341ed780e64dcc741e08672e810ef

    • Size

      393KB

    • MD5

      9ef677947ef06a4bc4fb01bed91c2f56

    • SHA1

      6938b1e21221c1a71bb315c44a274161a06409ca

    • SHA256

      2585fa9e70c816d66931f5dccc875327ff4341ed780e64dcc741e08672e810ef

    • SHA512

      4fcfe71006ca6d6a637ae63c7bccb5b49a8e38a489b0e7cce58b7e203d8318246b41ed08c8d0d36c0c8dc38b2e739285a922a3de10a87f2f71fc002ce185528b

    • SSDEEP

      6144:1LIoBwo1u1V1RcjiiL6cpPBs+VYOCI/m7N52CIc6bqiga3wVf:1lOo1u1V1UScpPq+rPu2Jbv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks