General

  • Target

    340e86ebe67c47699439b7bdafddce7f85dda393925b4b9109135aa6c5fe290a

  • Size

    394KB

  • Sample

    241110-lykxgavapm

  • MD5

    78f4a629ad2b7b5bc6772e8c19cbe1ee

  • SHA1

    0a68fb4f160b39a5099aca29ad0ca36e57a4b4d7

  • SHA256

    340e86ebe67c47699439b7bdafddce7f85dda393925b4b9109135aa6c5fe290a

  • SHA512

    fcf25feee2a25c71c2d8b355371118c105733075e4f371a6191e63ca81bf5722f30b3fadf2c4c383c5b0f0db128d838ee2a5dd063f91250a400d415c5aff9b37

  • SSDEEP

    6144:JvY/hfaNsYeaDDHBYolh5nkRAnlEJa7xwZ124+JXerMchss+x1UkUV:iht/a3HuUMRu7xw7f+h/wss+ck

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      340e86ebe67c47699439b7bdafddce7f85dda393925b4b9109135aa6c5fe290a

    • Size

      394KB

    • MD5

      78f4a629ad2b7b5bc6772e8c19cbe1ee

    • SHA1

      0a68fb4f160b39a5099aca29ad0ca36e57a4b4d7

    • SHA256

      340e86ebe67c47699439b7bdafddce7f85dda393925b4b9109135aa6c5fe290a

    • SHA512

      fcf25feee2a25c71c2d8b355371118c105733075e4f371a6191e63ca81bf5722f30b3fadf2c4c383c5b0f0db128d838ee2a5dd063f91250a400d415c5aff9b37

    • SSDEEP

      6144:JvY/hfaNsYeaDDHBYolh5nkRAnlEJa7xwZ124+JXerMchss+x1UkUV:iht/a3HuUMRu7xw7f+h/wss+ck

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks