General

  • Target

    48ed6cf0959d8465ac09207d450e2cbc1f458d777e814b514f25eeafb271f65cN

  • Size

    391KB

  • Sample

    241113-v2aqcavrbw

  • MD5

    b8c16867675c1aa2781ff0c82c8f33d0

  • SHA1

    7a623ae61def51e9359c49b9ba0f84ed538cf6b5

  • SHA256

    48ed6cf0959d8465ac09207d450e2cbc1f458d777e814b514f25eeafb271f65c

  • SHA512

    42b0fb2b1743a851290d471839cd7062178dcb22c7067a56dedee7850b860a0932d4040edf6563cdd2bfe401e96c0a66e7b58676cd5a51053e3d3dbe01022a7e

  • SSDEEP

    6144:hOrLL37QiTo9FsYgaZXIrMv/gCe8piXGjQ0yh:hOrnZuFs5aZ4Av48pVfyh

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      48ed6cf0959d8465ac09207d450e2cbc1f458d777e814b514f25eeafb271f65cN

    • Size

      391KB

    • MD5

      b8c16867675c1aa2781ff0c82c8f33d0

    • SHA1

      7a623ae61def51e9359c49b9ba0f84ed538cf6b5

    • SHA256

      48ed6cf0959d8465ac09207d450e2cbc1f458d777e814b514f25eeafb271f65c

    • SHA512

      42b0fb2b1743a851290d471839cd7062178dcb22c7067a56dedee7850b860a0932d4040edf6563cdd2bfe401e96c0a66e7b58676cd5a51053e3d3dbe01022a7e

    • SSDEEP

      6144:hOrLL37QiTo9FsYgaZXIrMv/gCe8piXGjQ0yh:hOrnZuFs5aZ4Av48pVfyh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks