General

  • Target

    745c1f859179c7c4cae003be36e463e89b844f383f4aa16fc93ef71ef8ca2195

  • Size

    434KB

  • Sample

    241110-wpflhasalj

  • MD5

    9856274358fcc0fa7c1ecec4fd08e8bd

  • SHA1

    cace1e06fe86dcea76bc8d4a009b3aac37ebab18

  • SHA256

    745c1f859179c7c4cae003be36e463e89b844f383f4aa16fc93ef71ef8ca2195

  • SHA512

    25868ed191c534892e5e0a0f443670629c92c3edf873dc813670d32a20b4a5fca69b4c4788902d3cd6c484bd93a65070433237e3160f3b869a2f8deaa1e92121

  • SSDEEP

    6144:MJTpi7bxjww3MK4zPcMZ4fPHsjcm8wldunH7qorYiQI/Q+VK1I:+ihF3QPXZ8sjfBlduneorYU/Q+V

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      745c1f859179c7c4cae003be36e463e89b844f383f4aa16fc93ef71ef8ca2195

    • Size

      434KB

    • MD5

      9856274358fcc0fa7c1ecec4fd08e8bd

    • SHA1

      cace1e06fe86dcea76bc8d4a009b3aac37ebab18

    • SHA256

      745c1f859179c7c4cae003be36e463e89b844f383f4aa16fc93ef71ef8ca2195

    • SHA512

      25868ed191c534892e5e0a0f443670629c92c3edf873dc813670d32a20b4a5fca69b4c4788902d3cd6c484bd93a65070433237e3160f3b869a2f8deaa1e92121

    • SSDEEP

      6144:MJTpi7bxjww3MK4zPcMZ4fPHsjcm8wldunH7qorYiQI/Q+VK1I:+ihF3QPXZ8sjfBlduneorYU/Q+V

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks