General

  • Target

    2a41e818b41659461ad48edb8287ca2d3667b1221120a0b2037e19c99956c0b9

  • Size

    407KB

  • Sample

    241111-b8c99szfnf

  • MD5

    275bd8bebd3dcfa705549d1b28d958f4

  • SHA1

    4d8dfc0e393e511b16b89c4917c9900d14ecf6ec

  • SHA256

    2a41e818b41659461ad48edb8287ca2d3667b1221120a0b2037e19c99956c0b9

  • SHA512

    39889925066c52bd6ead8d871775de1511f47f8a813a45b0cd1c2f49bb48c42926bd6248507eed94a91fbf12b50b8fd83e889bc5f3fcf69dbf406b1570bdba60

  • SSDEEP

    12288:t6PhF7P07sYCWyKrdsHVHBQwT2f2+m6ERNP:407sYz/MhQwibEj

Malware Config

Extracted

Family

redline

Botnet

ww

C2

193.106.191.67:44400

Attributes
  • auth_value

    5a1b28ccd05953f5c3f99729c12427cc

Targets

    • Target

      2a41e818b41659461ad48edb8287ca2d3667b1221120a0b2037e19c99956c0b9

    • Size

      407KB

    • MD5

      275bd8bebd3dcfa705549d1b28d958f4

    • SHA1

      4d8dfc0e393e511b16b89c4917c9900d14ecf6ec

    • SHA256

      2a41e818b41659461ad48edb8287ca2d3667b1221120a0b2037e19c99956c0b9

    • SHA512

      39889925066c52bd6ead8d871775de1511f47f8a813a45b0cd1c2f49bb48c42926bd6248507eed94a91fbf12b50b8fd83e889bc5f3fcf69dbf406b1570bdba60

    • SSDEEP

      12288:t6PhF7P07sYCWyKrdsHVHBQwT2f2+m6ERNP:407sYz/MhQwibEj

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.