General

  • Target

    af55130ccc88e2ae7f99208fe3920538895bfe27abd499efa6c0b2b18ca71cfc

  • Size

    273KB

  • Sample

    241110-vt18bs1jcz

  • MD5

    8e7dd46d7bce59d3d50c850c0a586c44

  • SHA1

    76ac8f29a33be9a2e8d4c4ed172be2d5c250b27b

  • SHA256

    af55130ccc88e2ae7f99208fe3920538895bfe27abd499efa6c0b2b18ca71cfc

  • SHA512

    a0fad95991a7fd5e431bcd9487bb1da588d6cbd7602f517cbc02fee12f84f54b48c9d7ace6b68ad05f5d6e8436bb4c812ac3f61ed00362542b66565a3768d9df

  • SSDEEP

    6144:i8qL1OPq8uDd1iFrjAF8X6wca3noINCeGFwB:5qcPqFMrjAKKwcWoV6

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      af55130ccc88e2ae7f99208fe3920538895bfe27abd499efa6c0b2b18ca71cfc

    • Size

      273KB

    • MD5

      8e7dd46d7bce59d3d50c850c0a586c44

    • SHA1

      76ac8f29a33be9a2e8d4c4ed172be2d5c250b27b

    • SHA256

      af55130ccc88e2ae7f99208fe3920538895bfe27abd499efa6c0b2b18ca71cfc

    • SHA512

      a0fad95991a7fd5e431bcd9487bb1da588d6cbd7602f517cbc02fee12f84f54b48c9d7ace6b68ad05f5d6e8436bb4c812ac3f61ed00362542b66565a3768d9df

    • SSDEEP

      6144:i8qL1OPq8uDd1iFrjAF8X6wca3noINCeGFwB:5qcPqFMrjAKKwcWoV6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks