General

  • Target

    b30016331a302ee0a781d04889ea5b9d18e726fcd972f6496598bd4a7b537b41

  • Size

    432KB

  • Sample

    241110-mdzqkavcnr

  • MD5

    5e634d4b8b1ae7a8321a22fdfb4f5bb8

  • SHA1

    5dbb52c11c8f7e9be086ac6acc05796bbd2f6e05

  • SHA256

    b30016331a302ee0a781d04889ea5b9d18e726fcd972f6496598bd4a7b537b41

  • SHA512

    ec2129b5d5a45d6e5cb586078e383ab19d0d7de954d0e4cfab71b9e3f24111171f7d0c1bc3a9ed4a652670879ad2a379169824b3c2ea32b941418a1261c8dc15

  • SSDEEP

    6144:JegQHXT3Kt595Gwa3jL/fhaCkIfyOR0iNHxzjK3mdDqkGs/QAB:J6Dat56webfhaCkIfldHxzm3mdVGs/Q

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      b30016331a302ee0a781d04889ea5b9d18e726fcd972f6496598bd4a7b537b41

    • Size

      432KB

    • MD5

      5e634d4b8b1ae7a8321a22fdfb4f5bb8

    • SHA1

      5dbb52c11c8f7e9be086ac6acc05796bbd2f6e05

    • SHA256

      b30016331a302ee0a781d04889ea5b9d18e726fcd972f6496598bd4a7b537b41

    • SHA512

      ec2129b5d5a45d6e5cb586078e383ab19d0d7de954d0e4cfab71b9e3f24111171f7d0c1bc3a9ed4a652670879ad2a379169824b3c2ea32b941418a1261c8dc15

    • SSDEEP

      6144:JegQHXT3Kt595Gwa3jL/fhaCkIfyOR0iNHxzjK3mdDqkGs/QAB:J6Dat56webfhaCkIfldHxzm3mdVGs/Q

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks