General

  • Target

    46c65c3f54690acff40ed60bda94ba1718d0914197ccba58c2bcd627032f2564

  • Size

    285KB

  • Sample

    241111-a1rbgsxqg1

  • MD5

    19ab9b5abfd00aa0bb7c50b93d4dc7aa

  • SHA1

    a0a3dabc3041bfa7abf3a68bf07c17f396370114

  • SHA256

    46c65c3f54690acff40ed60bda94ba1718d0914197ccba58c2bcd627032f2564

  • SHA512

    f98e037523d0dcea6a573d7c1181d49802172e9689bc550981226930411936fee1907676d8497fe72121a8a6ac7dac1948c25f92a402754a342b4de438e73565

  • SSDEEP

    6144:2htl++WFzyv+Lo2xHTHT6ArS0K3wkQl4fGiWzNFkly5+QoFNDBTENVx:2h1mU2BzNKAkQl4fN2Fkly5oNpEN7

Malware Config

Extracted

Family

redline

Botnet

@new@2023

C2

77.73.133.62:22344

Attributes
  • auth_value

    8284279aedaed026a9b7cb9c1c0be4e4

Targets

    • Target

      3210cd176f13733f6458a990baac9f37faf46d4f2e8567f30feaee26cba7c09e

    • Size

      362KB

    • MD5

      ef0e153fb53314447d65f5ef75566e85

    • SHA1

      d6201d70238020b36515dd4596b404a7534328a5

    • SHA256

      3210cd176f13733f6458a990baac9f37faf46d4f2e8567f30feaee26cba7c09e

    • SHA512

      c72671e029798fbf060692d4efa214814f1248b05c3d5db88d68a0f624004542b674ffb1b938dad4f030bb873917f57359c6eb02089fa60f9fc3d5dd20e69264

    • SSDEEP

      6144:UIhows1i/odDJK+v2o2xHTfT6Ara0K30kQ94fGiWzNFyUfbOIuk+:HhowsE/od1K62Bz5KkkQ94fN2FyUfaI

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks