General

  • Target

    fef7ddcee2119553733d71db28cc110f690153cc7063bb36d4565644bb518af9

  • Size

    273KB

  • Sample

    241110-w7cbss1rft

  • MD5

    1b3c3e90ade176aaa6e014cba33102bb

  • SHA1

    ad6b6cd52371850d454d982070318b4e46b4a46f

  • SHA256

    fef7ddcee2119553733d71db28cc110f690153cc7063bb36d4565644bb518af9

  • SHA512

    4457c8ef28147939b092935da861132da923601c40e97938aab012a97a76a9bb740ef6255eeb1d619f90dcb7ae463cfbb93bfa09457dac1ade17c586fb869141

  • SSDEEP

    6144:bdqL9TqYimTVI7rSr3n8NJpH0HtDZkuuIgZuUjptNrmCdT6VwLB:ZqJTq0TwQ8NJpH0NFkuyN9frmCde6L

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      fef7ddcee2119553733d71db28cc110f690153cc7063bb36d4565644bb518af9

    • Size

      273KB

    • MD5

      1b3c3e90ade176aaa6e014cba33102bb

    • SHA1

      ad6b6cd52371850d454d982070318b4e46b4a46f

    • SHA256

      fef7ddcee2119553733d71db28cc110f690153cc7063bb36d4565644bb518af9

    • SHA512

      4457c8ef28147939b092935da861132da923601c40e97938aab012a97a76a9bb740ef6255eeb1d619f90dcb7ae463cfbb93bfa09457dac1ade17c586fb869141

    • SSDEEP

      6144:bdqL9TqYimTVI7rSr3n8NJpH0HtDZkuuIgZuUjptNrmCdT6VwLB:ZqJTq0TwQ8NJpH0NFkuyN9frmCde6L

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks