General

  • Target

    0949866deb19b1339781c6b1803b3c00cbd318ad12331dc8ad5d530eba95c114

  • Size

    394KB

  • Sample

    241111-acxhlaxgrr

  • MD5

    e678c5eaa90d1aaaf3562528b2c285ea

  • SHA1

    b08b3fd3228bfa829bd1ed51bf25ff19314c17f4

  • SHA256

    0949866deb19b1339781c6b1803b3c00cbd318ad12331dc8ad5d530eba95c114

  • SHA512

    4ab3849d01d09733ea22a66afb5b758c5219c4c9aca71e45c4a1f167e501f539cf0c16ad41de6651047f4597aa75584777e914e7fd423961dc27ebf01c38c914

  • SSDEEP

    6144:lPi6qmtILCIkpkM6TocNPoK6PoeZWubwJzOPajIJ+ZMabu0xJMan11zA:l6UWLHkp5In8wJkajQ+eVIJMaQ

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      0949866deb19b1339781c6b1803b3c00cbd318ad12331dc8ad5d530eba95c114

    • Size

      394KB

    • MD5

      e678c5eaa90d1aaaf3562528b2c285ea

    • SHA1

      b08b3fd3228bfa829bd1ed51bf25ff19314c17f4

    • SHA256

      0949866deb19b1339781c6b1803b3c00cbd318ad12331dc8ad5d530eba95c114

    • SHA512

      4ab3849d01d09733ea22a66afb5b758c5219c4c9aca71e45c4a1f167e501f539cf0c16ad41de6651047f4597aa75584777e914e7fd423961dc27ebf01c38c914

    • SSDEEP

      6144:lPi6qmtILCIkpkM6TocNPoK6PoeZWubwJzOPajIJ+ZMabu0xJMan11zA:l6UWLHkp5In8wJkajQ+eVIJMaQ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks