General

  • Target

    dc5c52145f924554c3adaf495169922ad772bfbb978aa6faa9bc5e593d2ad54f

  • Size

    432KB

  • Sample

    241110-wyn91asene

  • MD5

    bf0f98415830933f9f88798158712944

  • SHA1

    3090ca7e518e75f171c8afe5aba433bc72405e8e

  • SHA256

    dc5c52145f924554c3adaf495169922ad772bfbb978aa6faa9bc5e593d2ad54f

  • SHA512

    3250d7a942d7460b60c27abbb048e58e303fb7104e64dc2d47e318686e25fe2011e904155b90ede66090b3201d2de217cd6f45ce7f7ddedb46cd37d13bf239ba

  • SSDEEP

    6144:JegQHXT3Kt595Gwa3jL/fhaCkIfyOR0iNHxzjK3mdDqkGs/QAB:J6Dat56webfhaCkIfldHxzm3mdVGs/Q

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      dc5c52145f924554c3adaf495169922ad772bfbb978aa6faa9bc5e593d2ad54f

    • Size

      432KB

    • MD5

      bf0f98415830933f9f88798158712944

    • SHA1

      3090ca7e518e75f171c8afe5aba433bc72405e8e

    • SHA256

      dc5c52145f924554c3adaf495169922ad772bfbb978aa6faa9bc5e593d2ad54f

    • SHA512

      3250d7a942d7460b60c27abbb048e58e303fb7104e64dc2d47e318686e25fe2011e904155b90ede66090b3201d2de217cd6f45ce7f7ddedb46cd37d13bf239ba

    • SSDEEP

      6144:JegQHXT3Kt595Gwa3jL/fhaCkIfyOR0iNHxzjK3mdDqkGs/QAB:J6Dat56webfhaCkIfldHxzm3mdVGs/Q

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks