General

  • Target

    412d7e08451c48a8e15eb5e269aa8d2e

  • Size

    252KB

  • Sample

    241110-3zhl6sxles

  • MD5

    412d7e08451c48a8e15eb5e269aa8d2e

  • SHA1

    273a63e5e9ed9e77df14501ea9e1169dc79e0d75

  • SHA256

    52c3e813e72f5f7b883f57d943fb765fd1949209d2a9cf127a66f088f55041e2

  • SHA512

    5b9de4b3977f8f96e3a5a019bebdcf7bcfb22e7bd7aa7ed295daa6cb09bd37a65b90108bee4f685ec1b60a964ec820c9ee3b0a06d80e125b39980198edc06fed

  • SSDEEP

    6144:YViKyzTM9CxOvFprsS/7sFE4HaGw5Jq0ibdZDP:YfyzwgxOvFZoFElq0ibnP

Malware Config

Extracted

Family

redline

Botnet

iNerinoEU

C2

193.233.48.58:38989

Attributes
  • auth_value

    4536d7478dc495213e425f08d6e8e496

Targets

    • Target

      06aa750e2aa74a1b400f885ecaa08746e4ce921d4435f7256ecc61c5b7f3e4a2

    • Size

      354KB

    • MD5

      a32a1371aa96c4a05718487e81a5076f

    • SHA1

      4aa52babf91fa19c992ec2b1e2f8a31a316a2784

    • SHA256

      06aa750e2aa74a1b400f885ecaa08746e4ce921d4435f7256ecc61c5b7f3e4a2

    • SHA512

      2a15018c2ce0591a3acf2e1aeffff9ead9ddc2aadd8217616264697d1dabb8decc470e48dca27ab205378471f3a241bfd7b8d0f6acb2bc46851a42537fc8f246

    • SSDEEP

      6144:/Ky6jgKvOOu13NBIjt2z8gMFprsy/7sFEoHaGwlJH9gF89tK52:yy6j/OOu13Q0z8gMF/oFEVT6ct

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks