General

  • Target

    74a27454aaf49d923fa9519e1cbe115844a47f5f215975bb07ab6457d2c609f5

  • Size

    274KB

  • Sample

    241110-wheqmascjh

  • MD5

    be6faa5a17dab1c9fc6fcd2787ed2d25

  • SHA1

    d4a1df3cd65d96fdfb3596fd1e7a6e168d0b441c

  • SHA256

    74a27454aaf49d923fa9519e1cbe115844a47f5f215975bb07ab6457d2c609f5

  • SHA512

    a8ccaa30b605782c1c8c4445a635657c415a213b0ad492c7e0672a39754b26781c0b2ddfd6b3c302425afcd1815767cba91d15d096c39210112fdc03e2ea0858

  • SSDEEP

    6144:3OzLoJazKULP9wHZZNQHnjSGWLSioSEIYR/mJekTfj4B:ezUJa3p0NQHGSwNYR+BTc

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      74a27454aaf49d923fa9519e1cbe115844a47f5f215975bb07ab6457d2c609f5

    • Size

      274KB

    • MD5

      be6faa5a17dab1c9fc6fcd2787ed2d25

    • SHA1

      d4a1df3cd65d96fdfb3596fd1e7a6e168d0b441c

    • SHA256

      74a27454aaf49d923fa9519e1cbe115844a47f5f215975bb07ab6457d2c609f5

    • SHA512

      a8ccaa30b605782c1c8c4445a635657c415a213b0ad492c7e0672a39754b26781c0b2ddfd6b3c302425afcd1815767cba91d15d096c39210112fdc03e2ea0858

    • SSDEEP

      6144:3OzLoJazKULP9wHZZNQHnjSGWLSioSEIYR/mJekTfj4B:ezUJa3p0NQHGSwNYR+BTc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks