General

  • Target

    e7a6513f52de3409246ceb26c7c1c6332a662b5fd819fffd9013903ea64be375

  • Size

    407KB

  • Sample

    241111-c8jygs1ckr

  • MD5

    e6bebf779af6c06d4e72855dcb11f13a

  • SHA1

    b47cb4c13e71ad95809bad1efc8d01dadb9fc449

  • SHA256

    e7a6513f52de3409246ceb26c7c1c6332a662b5fd819fffd9013903ea64be375

  • SHA512

    7b91f7c0f6acc1cc602dcc661d13e9849c8f5e920a8901b67bd7f3d015ed2192f73a0ede14e3dfd92724e3855dd80352a59a4022223a3071cd177526c3a7fe61

  • SSDEEP

    12288:9EviK64KoYNu/FtIvxWXTtGMvDfGMx9IPN8:L4KoyM8WXTtGgDfGy9IP

Malware Config

Extracted

Family

redline

Botnet

ww

C2

193.106.191.67:44400

Attributes
  • auth_value

    5a1b28ccd05953f5c3f99729c12427cc

Targets

    • Target

      e7a6513f52de3409246ceb26c7c1c6332a662b5fd819fffd9013903ea64be375

    • Size

      407KB

    • MD5

      e6bebf779af6c06d4e72855dcb11f13a

    • SHA1

      b47cb4c13e71ad95809bad1efc8d01dadb9fc449

    • SHA256

      e7a6513f52de3409246ceb26c7c1c6332a662b5fd819fffd9013903ea64be375

    • SHA512

      7b91f7c0f6acc1cc602dcc661d13e9849c8f5e920a8901b67bd7f3d015ed2192f73a0ede14e3dfd92724e3855dd80352a59a4022223a3071cd177526c3a7fe61

    • SSDEEP

      12288:9EviK64KoYNu/FtIvxWXTtGMvDfGMx9IPN8:L4KoyM8WXTtGgDfGy9IP

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks