General

  • Target

    b9ed468caafcef27f3d06619f0f8fdbfe28467e52a139ec874a7fdb2b51eee9f

  • Size

    274KB

  • Sample

    241110-xwxc9stcla

  • MD5

    f3e64db00319be1f1ed5ed3de5d406de

  • SHA1

    9c841a02f9f768c149e5f03b0e520f2190c8b47a

  • SHA256

    b9ed468caafcef27f3d06619f0f8fdbfe28467e52a139ec874a7fdb2b51eee9f

  • SHA512

    421ad06ae338617a3637accc1bc2ad31857db6f3e878a9e34ebfd70a690a0ca13ea217f459617adaf6fb6dec27dee9d99b50f2e4ff68434ff24a62e7f153a817

  • SSDEEP

    6144:3OzLoJazKULP9wHZZNQHnjSGWLSioSEIYR/mJekTfj4B:ezUJa3p0NQHGSwNYR+BTc

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      b9ed468caafcef27f3d06619f0f8fdbfe28467e52a139ec874a7fdb2b51eee9f

    • Size

      274KB

    • MD5

      f3e64db00319be1f1ed5ed3de5d406de

    • SHA1

      9c841a02f9f768c149e5f03b0e520f2190c8b47a

    • SHA256

      b9ed468caafcef27f3d06619f0f8fdbfe28467e52a139ec874a7fdb2b51eee9f

    • SHA512

      421ad06ae338617a3637accc1bc2ad31857db6f3e878a9e34ebfd70a690a0ca13ea217f459617adaf6fb6dec27dee9d99b50f2e4ff68434ff24a62e7f153a817

    • SSDEEP

      6144:3OzLoJazKULP9wHZZNQHnjSGWLSioSEIYR/mJekTfj4B:ezUJa3p0NQHGSwNYR+BTc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks