General

  • Target

    1945ce4caff7e52569162d9df537d30cf7d08b14b0a2201e5aebd043fc3dafda

  • Size

    287KB

  • Sample

    241110-z9kbzavgpq

  • MD5

    cb973c225a54409af8021174fe53eff0

  • SHA1

    1e01a9c95020b580c346c500b5f8a86036c84626

  • SHA256

    1945ce4caff7e52569162d9df537d30cf7d08b14b0a2201e5aebd043fc3dafda

  • SHA512

    eddbde09ae96af1579e8c84fa58b7cc6067461820b381cb406bf99350dbf690573834a6c6e64f1fa7fd7b042695057abbe9afb26e2dac7d65594585f9ea44c04

  • SSDEEP

    6144:Z8qL1ObqYbAiSCTmxTPj/0rtsvBS+5pTuzbgwuko6OB:mqcbquAGQTPgrtscURunnro6O

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      1945ce4caff7e52569162d9df537d30cf7d08b14b0a2201e5aebd043fc3dafda

    • Size

      287KB

    • MD5

      cb973c225a54409af8021174fe53eff0

    • SHA1

      1e01a9c95020b580c346c500b5f8a86036c84626

    • SHA256

      1945ce4caff7e52569162d9df537d30cf7d08b14b0a2201e5aebd043fc3dafda

    • SHA512

      eddbde09ae96af1579e8c84fa58b7cc6067461820b381cb406bf99350dbf690573834a6c6e64f1fa7fd7b042695057abbe9afb26e2dac7d65594585f9ea44c04

    • SSDEEP

      6144:Z8qL1ObqYbAiSCTmxTPj/0rtsvBS+5pTuzbgwuko6OB:mqcbquAGQTPgrtscURunnro6O

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks