General

  • Target

    dcdeebcc83454243aff8b5399ce034036bb3b601df0a1959f6741e9790b5f7d2N

  • Size

    372KB

  • Sample

    241111-b29d5azbll

  • MD5

    d0a091ff78c1394a04661a4d89d6d720

  • SHA1

    8c17bbfb2f08250cd42898d689d4c489e687c972

  • SHA256

    dcdeebcc83454243aff8b5399ce034036bb3b601df0a1959f6741e9790b5f7d2

  • SHA512

    c2cf12dbe7604dfbe35294bc2ec0be3d2204ef4fe473439889ae134df48fb8818d9cb6963abd8fab4a5eb62e5ac2bbe20aca14de2de8d76df1cb27bc848984c3

  • SSDEEP

    6144:mD3yZ+ywnBeIwAddYuugEHb7D9EWcxJP4Plaur7aW:mD3yZnUBeIw22ujEBEhxJwPlHz

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      dcdeebcc83454243aff8b5399ce034036bb3b601df0a1959f6741e9790b5f7d2N

    • Size

      372KB

    • MD5

      d0a091ff78c1394a04661a4d89d6d720

    • SHA1

      8c17bbfb2f08250cd42898d689d4c489e687c972

    • SHA256

      dcdeebcc83454243aff8b5399ce034036bb3b601df0a1959f6741e9790b5f7d2

    • SHA512

      c2cf12dbe7604dfbe35294bc2ec0be3d2204ef4fe473439889ae134df48fb8818d9cb6963abd8fab4a5eb62e5ac2bbe20aca14de2de8d76df1cb27bc848984c3

    • SSDEEP

      6144:mD3yZ+ywnBeIwAddYuugEHb7D9EWcxJP4Plaur7aW:mD3yZnUBeIw22ujEBEhxJwPlHz

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.