General

  • Target

    f82a86c97f8b292eeaf552d93d1a3abed5bee8d51f51399ff2506c5ad15ffd42N

  • Size

    171KB

  • Sample

    241111-cxrh7a1cmb

  • MD5

    7c522609da1b208130785fd963960e30

  • SHA1

    88015e1892b553449c96ba056f506f2c70c7cce6

  • SHA256

    f82a86c97f8b292eeaf552d93d1a3abed5bee8d51f51399ff2506c5ad15ffd42

  • SHA512

    b85c7d4ccdd61671affb401a229874b23b7160106855e1e7fba6e015d8c0659c0713ece511abbf87630376c5188e56ba00b44938aa81300a602fd5f9d0092f5f

  • SSDEEP

    3072:zbo2i9G9tCQUqVY+FRV1Qw88GjEop8e8hb:zbo2ik9E+F9Qw88GjEop

Malware Config

Extracted

Family

redline

Botnet

zima

C2

176.113.115.145:4125

Attributes
  • auth_value

    2ef701d510c0d27e8a8e3270281678b1

Targets

    • Target

      f82a86c97f8b292eeaf552d93d1a3abed5bee8d51f51399ff2506c5ad15ffd42N

    • Size

      171KB

    • MD5

      7c522609da1b208130785fd963960e30

    • SHA1

      88015e1892b553449c96ba056f506f2c70c7cce6

    • SHA256

      f82a86c97f8b292eeaf552d93d1a3abed5bee8d51f51399ff2506c5ad15ffd42

    • SHA512

      b85c7d4ccdd61671affb401a229874b23b7160106855e1e7fba6e015d8c0659c0713ece511abbf87630376c5188e56ba00b44938aa81300a602fd5f9d0092f5f

    • SSDEEP

      3072:zbo2i9G9tCQUqVY+FRV1Qw88GjEop8e8hb:zbo2ik9E+F9Qw88GjEop

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks