General

  • Target

    839777f15e6d5e72676762752e879a890cda361de8f69cea1f3de65fe0c52808

  • Size

    243KB

  • Sample

    241111-a3e18syglf

  • MD5

    27d5347b9d3d3d1df42be88c26c24208

  • SHA1

    09b54ea67f5dbabd25cac9433b4d3c9498ae5046

  • SHA256

    839777f15e6d5e72676762752e879a890cda361de8f69cea1f3de65fe0c52808

  • SHA512

    546b54b2b87b5db49ba34d90fa7aafef8fbd3b23a6251be432856f5c8fc92915f96d6476120f33758cc082a80f711b81c728ab047b66555218178c5fdaf19c2d

  • SSDEEP

    6144:UeR1/Z0eQc+mhXaVuH/VD7iXcZN2zQZ1hknN8hdfijsh6wchsSZ4:UeRlC9mhXa8h1N2zQZPkN8mwcmSZ4

Malware Config

Extracted

Family

redline

Botnet

twick

C2

trustedwicky.com:80

Attributes
  • auth_value

    2284521981f16053dae08194ef371cb3

Targets

    • Target

      819a8655527d4494d1419450e88601df1f94b9b32f689b5ba3483a95cd51a39c

    • Size

      362KB

    • MD5

      1b83e4fba8581f2d3c6734a10f63fe10

    • SHA1

      d3ff6b48e5bef0f045bedb145acc70be402db2d1

    • SHA256

      819a8655527d4494d1419450e88601df1f94b9b32f689b5ba3483a95cd51a39c

    • SHA512

      5a857071452729cebfd50c6626a2e183a671574deed34d4188d8fc7eeb4e54ad97b448a9188d8b6c7f8d0f026dcca0d66f240757ef4f3342b0dc594853ddcccb

    • SSDEEP

      6144:bH6bA9ODjmMxGQgek7vnHeEO0VD7iXcdN2zQZ1h4TN8hdfijsh6h+:bHbOHxoQgek7v+ElRN2zQZP4R8mh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks