General

  • Target

    35c89f5a2380d4093684462f028fb8a649690f767e20ab736f83b23f18238521

  • Size

    175KB

  • Sample

    241112-zxwt8szpc1

  • MD5

    06a5daa631aef33b7d1c680a12733771

  • SHA1

    c26ad83ddb44030c4eea09c0b34b8e58a111903f

  • SHA256

    35c89f5a2380d4093684462f028fb8a649690f767e20ab736f83b23f18238521

  • SHA512

    59dd08d043e077e3e21592da75048a45024e379422687b9dc3155223ab571f341172316ed426d2dff44d6ef0f3546da2a95f97399bef8b3cfd2cdfab53b12bb6

  • SSDEEP

    3072:6xqZWBJaHEDgXTzzfMK8emA9Xh8fxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOG:oqZVTPfBbXh

Malware Config

Extracted

Family

redline

Botnet

dunkan

C2

193.233.20.24:4123

Attributes
  • auth_value

    505c396c57c6287fc3fdc5f3aeab0819

Targets

    • Target

      35c89f5a2380d4093684462f028fb8a649690f767e20ab736f83b23f18238521

    • Size

      175KB

    • MD5

      06a5daa631aef33b7d1c680a12733771

    • SHA1

      c26ad83ddb44030c4eea09c0b34b8e58a111903f

    • SHA256

      35c89f5a2380d4093684462f028fb8a649690f767e20ab736f83b23f18238521

    • SHA512

      59dd08d043e077e3e21592da75048a45024e379422687b9dc3155223ab571f341172316ed426d2dff44d6ef0f3546da2a95f97399bef8b3cfd2cdfab53b12bb6

    • SSDEEP

      3072:6xqZWBJaHEDgXTzzfMK8emA9Xh8fxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOG:oqZVTPfBbXh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks