General

  • Target

    fe312b4ba13f195213f84d9eb677e58121c9f920c9819a504c1c0549e06feff0

  • Size

    325KB

  • Sample

    241111-c1zzqs1anr

  • MD5

    48f1936aaaf5efcb6fc9dd0efd059ef3

  • SHA1

    af890f094decabac4ecbddcb4611304f37e3ab13

  • SHA256

    fe312b4ba13f195213f84d9eb677e58121c9f920c9819a504c1c0549e06feff0

  • SHA512

    44f6426c55c5e63acb17d4877fcd0bc2acc10c3f9887893365e366409be3de2b8e74dfdcca3edeb0f15f09ae5c46cd6ee8ca2c146bbda603a9b8cd0acbf70ccd

  • SSDEEP

    6144:4kQuOSvy0tyg9E4rCRf9DX6E0ZYYIvNyEm8N:49uOSvy+RC+EOxIvgEm

Malware Config

Extracted

Family

redline

Botnet

TripleSBanks

C2

185.143.223.90:10024

Attributes
  • auth_value

    064872fe393e6f3a6d60eca59269d528

Targets

    • Target

      fe312b4ba13f195213f84d9eb677e58121c9f920c9819a504c1c0549e06feff0

    • Size

      325KB

    • MD5

      48f1936aaaf5efcb6fc9dd0efd059ef3

    • SHA1

      af890f094decabac4ecbddcb4611304f37e3ab13

    • SHA256

      fe312b4ba13f195213f84d9eb677e58121c9f920c9819a504c1c0549e06feff0

    • SHA512

      44f6426c55c5e63acb17d4877fcd0bc2acc10c3f9887893365e366409be3de2b8e74dfdcca3edeb0f15f09ae5c46cd6ee8ca2c146bbda603a9b8cd0acbf70ccd

    • SSDEEP

      6144:4kQuOSvy0tyg9E4rCRf9DX6E0ZYYIvNyEm8N:49uOSvy+RC+EOxIvgEm

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks