General

  • Target

    a0c1a3fcf629a122c9866644b26f033194f47d3ee6c365866f9d3cc336ba1ccc

  • Size

    433KB

  • Sample

    241110-t3qyaatnep

  • MD5

    ca114479aedeca590baffdc56fd13da6

  • SHA1

    2a0b887dd69ef2a30bf99d2dcd626e06fd73e1f5

  • SHA256

    a0c1a3fcf629a122c9866644b26f033194f47d3ee6c365866f9d3cc336ba1ccc

  • SHA512

    c7732fed0e49f20c7bc81b3bd276846661f4226a39e87acc0385f80476ac6a20ed39bf5ee6840f75ff28813e3dd6f19c5301b4aea9b54da64e07e67744c3a774

  • SSDEEP

    6144:AdToZq3KGUE6ySWgZk589XDR8JuLLH2PRpm7oio4AylG8Tqpx:KTn4E6y+k58dGQX2PRpm7/o4AD8Tq/

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      a0c1a3fcf629a122c9866644b26f033194f47d3ee6c365866f9d3cc336ba1ccc

    • Size

      433KB

    • MD5

      ca114479aedeca590baffdc56fd13da6

    • SHA1

      2a0b887dd69ef2a30bf99d2dcd626e06fd73e1f5

    • SHA256

      a0c1a3fcf629a122c9866644b26f033194f47d3ee6c365866f9d3cc336ba1ccc

    • SHA512

      c7732fed0e49f20c7bc81b3bd276846661f4226a39e87acc0385f80476ac6a20ed39bf5ee6840f75ff28813e3dd6f19c5301b4aea9b54da64e07e67744c3a774

    • SSDEEP

      6144:AdToZq3KGUE6ySWgZk589XDR8JuLLH2PRpm7oio4AylG8Tqpx:KTn4E6y+k58dGQX2PRpm7/o4AD8Tq/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks