General

  • Target

    75ec403ed6f0aed48b83ad357f188c43782d33b0d0ac6da028ad7451fab146a5

  • Size

    446KB

  • Sample

    241110-tl9daszkgw

  • MD5

    68d9c32e71343d2f797356f7615b8a41

  • SHA1

    70e772655da6a71f85cba2989625b068f8ccde07

  • SHA256

    75ec403ed6f0aed48b83ad357f188c43782d33b0d0ac6da028ad7451fab146a5

  • SHA512

    1dfeb86cb5516066b464ce140a971b3de377da9bc1ae9eff11a0dadb667f5ae2422f8aef092bb989133fe80d88b79f2ee7c14c8da82a710526119e24662ecd2e

  • SSDEEP

    6144:+YyWzDI3pZCdgaf62qT2Ew+34Ua66+u4jPBq2pjSKcGd56:Sv3p4KaEX34UJ6+uw5q2pjxd5

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      75ec403ed6f0aed48b83ad357f188c43782d33b0d0ac6da028ad7451fab146a5

    • Size

      446KB

    • MD5

      68d9c32e71343d2f797356f7615b8a41

    • SHA1

      70e772655da6a71f85cba2989625b068f8ccde07

    • SHA256

      75ec403ed6f0aed48b83ad357f188c43782d33b0d0ac6da028ad7451fab146a5

    • SHA512

      1dfeb86cb5516066b464ce140a971b3de377da9bc1ae9eff11a0dadb667f5ae2422f8aef092bb989133fe80d88b79f2ee7c14c8da82a710526119e24662ecd2e

    • SSDEEP

      6144:+YyWzDI3pZCdgaf62qT2Ew+34Ua66+u4jPBq2pjSKcGd56:Sv3p4KaEX34UJ6+uw5q2pjxd5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks