General

  • Target

    3af73f0c0b8456550f1f168628f362d86d9c572a71d2948c3aa170b0c159aec8

  • Size

    399KB

  • Sample

    241111-lbpl5sxckm

  • MD5

    e9e23bd789fe811fe238fee285904895

  • SHA1

    97010f327e5b4adf2d29b948a8e27467e43df129

  • SHA256

    3af73f0c0b8456550f1f168628f362d86d9c572a71d2948c3aa170b0c159aec8

  • SHA512

    4e7a89e2f444f04d6eaca287759fa939b1fabd6326ba0a21da8619626dd96ba5f683a5086a4e1342922743b0c8e14e8b0451134c9eff8718447b796280d26420

  • SSDEEP

    6144:hYz/BU2MVmeX6BdwK4pkSWJe/6qWja78GurL5SnL2UYiga:0BU2MV1ss/5W754Jl

Malware Config

Extracted

Family

redline

Botnet

RuzkiUNIKALNO

C2

193.233.48.58:38989

Attributes
  • auth_value

    c504b04cfbdd4bf85ce6195bcb37fba6

Targets

    • Target

      3af73f0c0b8456550f1f168628f362d86d9c572a71d2948c3aa170b0c159aec8

    • Size

      399KB

    • MD5

      e9e23bd789fe811fe238fee285904895

    • SHA1

      97010f327e5b4adf2d29b948a8e27467e43df129

    • SHA256

      3af73f0c0b8456550f1f168628f362d86d9c572a71d2948c3aa170b0c159aec8

    • SHA512

      4e7a89e2f444f04d6eaca287759fa939b1fabd6326ba0a21da8619626dd96ba5f683a5086a4e1342922743b0c8e14e8b0451134c9eff8718447b796280d26420

    • SSDEEP

      6144:hYz/BU2MVmeX6BdwK4pkSWJe/6qWja78GurL5SnL2UYiga:0BU2MV1ss/5W754Jl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks