General

  • Target

    72c1564ea516ca17af5bd37f55b47e2ef06421e04db098b93d48ef4654b408b7

  • Size

    446KB

  • Sample

    241110-k7hm2atgre

  • MD5

    f368e78b07e70d2f9d7a8fb5ef6d44d5

  • SHA1

    aa218c8389df34a9122e22cbbaf26bb22eba2020

  • SHA256

    72c1564ea516ca17af5bd37f55b47e2ef06421e04db098b93d48ef4654b408b7

  • SHA512

    a375cdc247f7803d540ccdabe1f1132b7b3c176d95ea87c2ecb3dce3c54eccdff2fbacad303a22ea2efbb85204dece0d3669658d13cc00200b374168a30858c6

  • SSDEEP

    6144:+YyWzDI3pZCdgaf62qT2Ew+34Ua66+u4jPBq2pjSKcGd56:Sv3p4KaEX34UJ6+uw5q2pjxd5

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      72c1564ea516ca17af5bd37f55b47e2ef06421e04db098b93d48ef4654b408b7

    • Size

      446KB

    • MD5

      f368e78b07e70d2f9d7a8fb5ef6d44d5

    • SHA1

      aa218c8389df34a9122e22cbbaf26bb22eba2020

    • SHA256

      72c1564ea516ca17af5bd37f55b47e2ef06421e04db098b93d48ef4654b408b7

    • SHA512

      a375cdc247f7803d540ccdabe1f1132b7b3c176d95ea87c2ecb3dce3c54eccdff2fbacad303a22ea2efbb85204dece0d3669658d13cc00200b374168a30858c6

    • SSDEEP

      6144:+YyWzDI3pZCdgaf62qT2Ew+34Ua66+u4jPBq2pjSKcGd56:Sv3p4KaEX34UJ6+uw5q2pjxd5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks