General

  • Target

    2d92a45f11ffe01fd21ade74fd50024934ee984adff15aba02cd1449b28eaead

  • Size

    394KB

  • Sample

    241110-zqtrasvdmm

  • MD5

    9ed38f444712b9b208e7e479a9e3166b

  • SHA1

    e5500b83f2c40c997e29e7e17a61cadd16acd30f

  • SHA256

    2d92a45f11ffe01fd21ade74fd50024934ee984adff15aba02cd1449b28eaead

  • SHA512

    79dd6bc45df08eba00be97560ea4e08a8659a74d8c81907465103fe72be63548a913adf3d0ea04799627f1571cd8b928ff32d4510a6d1661b32d25e30e86db7f

  • SSDEEP

    6144:JvY/hfaNsYeaDDHBYolh5nkRAnlEJa7xwZ124+JXerMchss+x1UkUV:iht/a3HuUMRu7xw7f+h/wss+ck

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      2d92a45f11ffe01fd21ade74fd50024934ee984adff15aba02cd1449b28eaead

    • Size

      394KB

    • MD5

      9ed38f444712b9b208e7e479a9e3166b

    • SHA1

      e5500b83f2c40c997e29e7e17a61cadd16acd30f

    • SHA256

      2d92a45f11ffe01fd21ade74fd50024934ee984adff15aba02cd1449b28eaead

    • SHA512

      79dd6bc45df08eba00be97560ea4e08a8659a74d8c81907465103fe72be63548a913adf3d0ea04799627f1571cd8b928ff32d4510a6d1661b32d25e30e86db7f

    • SSDEEP

      6144:JvY/hfaNsYeaDDHBYolh5nkRAnlEJa7xwZ124+JXerMchss+x1UkUV:iht/a3HuUMRu7xw7f+h/wss+ck

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks