General

  • Target

    6caf8ae1b5db9af79be32f571924c92e9ab55eb24cba334a425fb48166ad901d

  • Size

    447KB

  • Sample

    241110-lq58fathln

  • MD5

    cb9fb5baba01dc4b29a4d0a6eca700ad

  • SHA1

    1a8ca409459814ac3f1c28c3947532598170e22a

  • SHA256

    6caf8ae1b5db9af79be32f571924c92e9ab55eb24cba334a425fb48166ad901d

  • SHA512

    b556c859928f4a4f0eec149516da65eaa555568b39f80c64b1c04c127967ff1c19727fd5583cf7e841a66608481b9b11bce7ca6d95d724393c334d0e1555fdd1

  • SSDEEP

    6144:/XO7VIXtU2yzAv0SzT2pXsjPTA5zZUylECTi1zLKS2ri8Tq7Cq/O:8VIXtLyzA8SeyPTqZUylhG1zLYm8TyO

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      6caf8ae1b5db9af79be32f571924c92e9ab55eb24cba334a425fb48166ad901d

    • Size

      447KB

    • MD5

      cb9fb5baba01dc4b29a4d0a6eca700ad

    • SHA1

      1a8ca409459814ac3f1c28c3947532598170e22a

    • SHA256

      6caf8ae1b5db9af79be32f571924c92e9ab55eb24cba334a425fb48166ad901d

    • SHA512

      b556c859928f4a4f0eec149516da65eaa555568b39f80c64b1c04c127967ff1c19727fd5583cf7e841a66608481b9b11bce7ca6d95d724393c334d0e1555fdd1

    • SSDEEP

      6144:/XO7VIXtU2yzAv0SzT2pXsjPTA5zZUylECTi1zLKS2ri8Tq7Cq/O:8VIXtLyzA8SeyPTqZUylhG1zLYm8TyO

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks