General

  • Target

    d3c3f72350289adff4b708ae6b71bbab21caecdcfefec97c4279dbfdd9b8f490

  • Size

    297KB

  • Sample

    241111-kcvzwazmem

  • MD5

    53c38445e47b9117d0eeabd2c10b6566

  • SHA1

    02e1285be8e4581da6b5d3599fe4dc61b5ac4c41

  • SHA256

    d3c3f72350289adff4b708ae6b71bbab21caecdcfefec97c4279dbfdd9b8f490

  • SHA512

    d7967ed288bfb1fd6de77ed69fef4d436eced66035529520ceb463eca650c7e35827bbd1a993f2ac40cbd40b75e0b0baa0b1fea8a134c17cb27986b535ffae62

  • SSDEEP

    6144:rvHwCMbovQJ2lzmGk2l3u7ZOuc50Cb/7rRSUbHMfG4:rPwCMbovQJ6N3u7ZeR/7Ce

Malware Config

Extracted

Family

redline

Botnet

1

C2

45.9.20.59:46287

Attributes
  • auth_value

    ec6ada170bcec2e72f0e1f3954547f73

Targets

    • Target

      d3c3f72350289adff4b708ae6b71bbab21caecdcfefec97c4279dbfdd9b8f490

    • Size

      297KB

    • MD5

      53c38445e47b9117d0eeabd2c10b6566

    • SHA1

      02e1285be8e4581da6b5d3599fe4dc61b5ac4c41

    • SHA256

      d3c3f72350289adff4b708ae6b71bbab21caecdcfefec97c4279dbfdd9b8f490

    • SHA512

      d7967ed288bfb1fd6de77ed69fef4d436eced66035529520ceb463eca650c7e35827bbd1a993f2ac40cbd40b75e0b0baa0b1fea8a134c17cb27986b535ffae62

    • SSDEEP

      6144:rvHwCMbovQJ2lzmGk2l3u7ZOuc50Cb/7rRSUbHMfG4:rPwCMbovQJ6N3u7ZeR/7Ce

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks