General

  • Target

    596596f944b83017f49c9f3991a690fa6ad2a5bb5e92bbb7666f300e1c2f7548

  • Size

    436KB

  • Sample

    241111-bxdrnazakl

  • MD5

    520e207ce6e712907f86d530bff416ae

  • SHA1

    a4f2bf776e2c8d784fc08e3fe1d1441ac4199704

  • SHA256

    596596f944b83017f49c9f3991a690fa6ad2a5bb5e92bbb7666f300e1c2f7548

  • SHA512

    8477a6ebf89a04c276142d7907261d1fac8484e690d3efb8e09f42ebd7560d69c0e677431ffcd4936f8e551e6ad99046b87b72ae18b6daa6a91d0496a601b87d

  • SSDEEP

    6144:X/0waUW+rJNWUeGxIasIAzQ58Kw1s84Ytb12vohdyWCkEq/a172N:dJNteAMISQaK784Ytb1QohdskEq2

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      596596f944b83017f49c9f3991a690fa6ad2a5bb5e92bbb7666f300e1c2f7548

    • Size

      436KB

    • MD5

      520e207ce6e712907f86d530bff416ae

    • SHA1

      a4f2bf776e2c8d784fc08e3fe1d1441ac4199704

    • SHA256

      596596f944b83017f49c9f3991a690fa6ad2a5bb5e92bbb7666f300e1c2f7548

    • SHA512

      8477a6ebf89a04c276142d7907261d1fac8484e690d3efb8e09f42ebd7560d69c0e677431ffcd4936f8e551e6ad99046b87b72ae18b6daa6a91d0496a601b87d

    • SSDEEP

      6144:X/0waUW+rJNWUeGxIasIAzQ58Kw1s84Ytb12vohdyWCkEq/a172N:dJNteAMISQaK784Ytb1QohdskEq2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks