General

  • Target

    04826783865a7534b8a1b3903a477eb8a2057c0ef7cf651ab6ad4d330ee5d557

  • Size

    434KB

  • Sample

    241111-h13crawbld

  • MD5

    65a118af15e37d9f8d2cd51f2de5ae74

  • SHA1

    094f0298faa547d169dc79eea7768342a1ad59f4

  • SHA256

    04826783865a7534b8a1b3903a477eb8a2057c0ef7cf651ab6ad4d330ee5d557

  • SHA512

    fd8386dd940114b32d2168e6f71eabfd77ca48d978316301d86eb0491fe75d804e1431f0716f54b9615f9014c18e30d25c5e54ab4633a8418b57a8b72d4ba460

  • SSDEEP

    6144:MJTpi7bxjww3MK4zPcMZ4fPHsjcm8wldunH7qorYiQI/Q+VK1I:+ihF3QPXZ8sjfBlduneorYU/Q+V

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      04826783865a7534b8a1b3903a477eb8a2057c0ef7cf651ab6ad4d330ee5d557

    • Size

      434KB

    • MD5

      65a118af15e37d9f8d2cd51f2de5ae74

    • SHA1

      094f0298faa547d169dc79eea7768342a1ad59f4

    • SHA256

      04826783865a7534b8a1b3903a477eb8a2057c0ef7cf651ab6ad4d330ee5d557

    • SHA512

      fd8386dd940114b32d2168e6f71eabfd77ca48d978316301d86eb0491fe75d804e1431f0716f54b9615f9014c18e30d25c5e54ab4633a8418b57a8b72d4ba460

    • SSDEEP

      6144:MJTpi7bxjww3MK4zPcMZ4fPHsjcm8wldunH7qorYiQI/Q+VK1I:+ihF3QPXZ8sjfBlduneorYU/Q+V

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks