General

  • Target

    ff149c078a86bbfc5291bd55e15260790a752ef95b9704d22a6d6c5eb1655fb2N.exe

  • Size

    285KB

  • Sample

    241205-w22z9ssnem

  • MD5

    88e50b6bc7ed665ab5b8597e1d441760

  • SHA1

    99c3183205a5dd71a87e55aa567b7c98e78e3723

  • SHA256

    ff149c078a86bbfc5291bd55e15260790a752ef95b9704d22a6d6c5eb1655fb2

  • SHA512

    344a1cce501913ab98c0280ae2ed229ba768fb927eccd20196bb0536d490a9c4cec6b27b231654fb1e583a1d92e7d0a5f9d3606727117758bc4e762d93f1db6c

  • SSDEEP

    6144:G5O6oBTgUlJ8SDTtlB3X1x/je5IoWUKzweFO1+7C0K:4TATgwJjDDBHPe5IolaweFO8en

Malware Config

Extracted

Family

redline

Botnet

fronx

C2

fronxtracking.com:80

Attributes
  • auth_value

    6e7038b202e5ac311b24bb13cac75d68

Targets

    • Target

      ff149c078a86bbfc5291bd55e15260790a752ef95b9704d22a6d6c5eb1655fb2N.exe

    • Size

      285KB

    • MD5

      88e50b6bc7ed665ab5b8597e1d441760

    • SHA1

      99c3183205a5dd71a87e55aa567b7c98e78e3723

    • SHA256

      ff149c078a86bbfc5291bd55e15260790a752ef95b9704d22a6d6c5eb1655fb2

    • SHA512

      344a1cce501913ab98c0280ae2ed229ba768fb927eccd20196bb0536d490a9c4cec6b27b231654fb1e583a1d92e7d0a5f9d3606727117758bc4e762d93f1db6c

    • SSDEEP

      6144:G5O6oBTgUlJ8SDTtlB3X1x/je5IoWUKzweFO1+7C0K:4TATgwJjDDBHPe5IolaweFO8en

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks