General

  • Target

    e019713eec3151eb60cb193a91a0cd38ea9c13e68cda9cfb8c4113b6086c457a

  • Size

    64KB

  • Sample

    241111-byxwxsyndw

  • MD5

    5aa4985cbc8e90da3d48041588d8ab00

  • SHA1

    781b62072d7b5405426a994a85f35a6e477db3f4

  • SHA256

    e019713eec3151eb60cb193a91a0cd38ea9c13e68cda9cfb8c4113b6086c457a

  • SHA512

    547a7c1f1f5e41de8ef0fdd2a916bfdbd066ae8d25c0bb3c8fb2d0bf0e6168963e8360357f84c0a0fc7f317334edc84b1cda0cabfb07050e5cbcfb0eee90e78a

  • SSDEEP

    1536:u1FnjlwawwI++aCbEd39ibD4knoxdnekJbzu9B6O41fIcfsQ:u1FjSawtRasm8v4PvekJba9B6bxSQ

Malware Config

Extracted

Family

redline

Botnet

mufos

C2

217.196.96.102:4132

Attributes
  • auth_value

    136f202e6569ad5815c34377858a255c

Targets

    • Target

      3a698482dd9203582a5d49390ea27624be7cf93a3b56dddd35e18d4373a4398c

    • Size

      168KB

    • MD5

      277ee554d85adf1657027f0716939c5d

    • SHA1

      d840cb06e348435097ad6ca76b7a92d0eaa33778

    • SHA256

      3a698482dd9203582a5d49390ea27624be7cf93a3b56dddd35e18d4373a4398c

    • SHA512

      302df7a87277812fa4799330c619e52d8cb412ba210e739b72506a90ba33b285720a2946da7483bd7c2cbafa76b967f81232aba62bea8bc740208de4c6a4a680

    • SSDEEP

      3072:1htNi4N8WVgJQ4C380guqV4gXhBpSK8egG18e8hK:FYsgJYPgu/A5SK8egG1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks