General

  • Target

    a031acb7eb7c6d56ecbd4573589f847ee3dee2247573942f002f984237ac7c8aN.exe

  • Size

    359KB

  • Sample

    241111-apqktaxpav

  • MD5

    43f8ad266ac861d77018d0f1163d0128

  • SHA1

    a20295ca50bd204d6ad901cfce8d1a153d4470dc

  • SHA256

    a82141ffeb358060d62e69eb1a4860166f67cda37a250f3c44ca45d2bf17214d

  • SHA512

    da8deb3867813cbb9b338a2540e9bf177f955fc95dce7daf37a3dcefd23af80b8d1fa580e2bdd507bef0980a90365ec6c7ac30019e73325db7584e847dae1f51

  • SSDEEP

    6144:Le2B0VLViXukUhdWLOSgY3yVegwr1YMzz16plnZy:bB0V5i+GO1YC4gwr1ff16s

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Targets

    • Target

      a031acb7eb7c6d56ecbd4573589f847ee3dee2247573942f002f984237ac7c8aN.exe

    • Size

      359KB

    • MD5

      43f8ad266ac861d77018d0f1163d0128

    • SHA1

      a20295ca50bd204d6ad901cfce8d1a153d4470dc

    • SHA256

      a82141ffeb358060d62e69eb1a4860166f67cda37a250f3c44ca45d2bf17214d

    • SHA512

      da8deb3867813cbb9b338a2540e9bf177f955fc95dce7daf37a3dcefd23af80b8d1fa580e2bdd507bef0980a90365ec6c7ac30019e73325db7584e847dae1f51

    • SSDEEP

      6144:Le2B0VLViXukUhdWLOSgY3yVegwr1YMzz16plnZy:bB0V5i+GO1YC4gwr1ff16s

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks