General

  • Target

    e1d0fe3bada7fdec17d7279e6294731e2684399905f05e5a3449ba14542b1379.exe

  • Size

    304KB

  • Sample

    241214-rbrz6awlar

  • MD5

    0f02da56dab4bc19fca05d6d93e74dcf

  • SHA1

    a809c7e9c3136b8030727f128004aa2c31edc7a9

  • SHA256

    e1d0fe3bada7fdec17d7279e6294731e2684399905f05e5a3449ba14542b1379

  • SHA512

    522ec9042680a94a73cefa56e7902bacb166e23484f041c9e06dce033d3d16d13f7508f4d1e160c81198f61aa8c9a5aecfa62068150705ecf4803733f7e01ded

  • SSDEEP

    3072:wq6EgY6imrUjTBUzwPC24EowndGt16TAHtASi6lcZqf7D34leqiOLibBOw:zqY6i8wPeEZndGtMTANAUlcZqf7DIvL

Malware Config

Extracted

Family

redline

Botnet

BUY TG @FATHEROFCARDERS

C2

45.66.231.214:9932

Targets

    • Target

      e1d0fe3bada7fdec17d7279e6294731e2684399905f05e5a3449ba14542b1379.exe

    • Size

      304KB

    • MD5

      0f02da56dab4bc19fca05d6d93e74dcf

    • SHA1

      a809c7e9c3136b8030727f128004aa2c31edc7a9

    • SHA256

      e1d0fe3bada7fdec17d7279e6294731e2684399905f05e5a3449ba14542b1379

    • SHA512

      522ec9042680a94a73cefa56e7902bacb166e23484f041c9e06dce033d3d16d13f7508f4d1e160c81198f61aa8c9a5aecfa62068150705ecf4803733f7e01ded

    • SSDEEP

      3072:wq6EgY6imrUjTBUzwPC24EowndGt16TAHtASi6lcZqf7D34leqiOLibBOw:zqY6i8wPeEZndGtMTANAUlcZqf7DIvL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks