General

  • Target

    084906fad10196ae99505ff011f143404297a5e4ba2d85cc9e5bb8be5b57eb7c

  • Size

    433KB

  • Sample

    241110-yw4ysaxler

  • MD5

    1061660d5dddfb39f578c1d465962fb5

  • SHA1

    db59f683a0620012d5ea7c97845b2672e1a5965d

  • SHA256

    084906fad10196ae99505ff011f143404297a5e4ba2d85cc9e5bb8be5b57eb7c

  • SHA512

    4cea3ece8558d033e4095cf31b5d8641294d44a65da8504b5be013d971d4fddf6b3207b526a0ac691463c40e262115080a7b60af6da60c913d55ae1391ae7553

  • SSDEEP

    6144:AdToZq3KGUE6ySWgZk589XDR8JuLLH2PRpm7oio4AylG8Tqpx:KTn4E6y+k58dGQX2PRpm7/o4AD8Tq/

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      084906fad10196ae99505ff011f143404297a5e4ba2d85cc9e5bb8be5b57eb7c

    • Size

      433KB

    • MD5

      1061660d5dddfb39f578c1d465962fb5

    • SHA1

      db59f683a0620012d5ea7c97845b2672e1a5965d

    • SHA256

      084906fad10196ae99505ff011f143404297a5e4ba2d85cc9e5bb8be5b57eb7c

    • SHA512

      4cea3ece8558d033e4095cf31b5d8641294d44a65da8504b5be013d971d4fddf6b3207b526a0ac691463c40e262115080a7b60af6da60c913d55ae1391ae7553

    • SSDEEP

      6144:AdToZq3KGUE6ySWgZk589XDR8JuLLH2PRpm7oio4AylG8Tqpx:KTn4E6y+k58dGQX2PRpm7/o4AD8Tq/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks