General

  • Target

    4ae51a1e68fd9e1d95f6decc5d80ff248f4809d0b0cee606f8b1e47dccf78394N

  • Size

    349KB

  • Sample

    241111-cxpdtstngj

  • MD5

    6b9c456641ce3c060d0b03d8d69f6ae0

  • SHA1

    eba04c5ebb01736902c51cafa2eca226440392f4

  • SHA256

    4ae51a1e68fd9e1d95f6decc5d80ff248f4809d0b0cee606f8b1e47dccf78394

  • SHA512

    4a39c7a859cc841ed6dc8258be7ffb0769758c82f32dc5e95cdd103efb00695f2cad5126a6cfc1518ea8d7fd3989299c700f74902ed30cb3fcbbd7a29ea02ff0

  • SSDEEP

    6144:nOgML34cKDDyHqFv3/KJ0qs8UAgu1SvcOpb6iCJxV2BBGv/sh8:nOj74DwqFv3oTs8UqEEOV6zJaQsh8

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      4ae51a1e68fd9e1d95f6decc5d80ff248f4809d0b0cee606f8b1e47dccf78394N

    • Size

      349KB

    • MD5

      6b9c456641ce3c060d0b03d8d69f6ae0

    • SHA1

      eba04c5ebb01736902c51cafa2eca226440392f4

    • SHA256

      4ae51a1e68fd9e1d95f6decc5d80ff248f4809d0b0cee606f8b1e47dccf78394

    • SHA512

      4a39c7a859cc841ed6dc8258be7ffb0769758c82f32dc5e95cdd103efb00695f2cad5126a6cfc1518ea8d7fd3989299c700f74902ed30cb3fcbbd7a29ea02ff0

    • SSDEEP

      6144:nOgML34cKDDyHqFv3/KJ0qs8UAgu1SvcOpb6iCJxV2BBGv/sh8:nOj74DwqFv3oTs8UqEEOV6zJaQsh8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks