General

  • Target

    9ff724fb4c48b8da74c98b621cddff271942047617f04443ba3b1ed0b8f70d4d.exe

  • Size

    300KB

  • Sample

    250205-emmhlazqan

  • MD5

    d128291a5d60b17b22dccbedd7b711fd

  • SHA1

    7ee96b938de052f70026664b8a4f3be6a80a6596

  • SHA256

    9ff724fb4c48b8da74c98b621cddff271942047617f04443ba3b1ed0b8f70d4d

  • SHA512

    9c95023be796fbd58a5fee7a02161be17612b008609531043bfe44d25c7aca7c2c62e2d0f64d6cb1c5efda6089c826618d5aa48cbe171a0025e6356d66a25a5c

  • SSDEEP

    3072:6cZqf7D34Np/0+mAUkywpgQEgjpB1fA0PuTVAtkxzy3RseqiOL2bBOA:6cZqf7DIXn7TRB1fA0GTV8kgUL

Malware Config

Extracted

Family

redline

Botnet

Standoff

C2

89.23.101.77:1912

Targets

    • Target

      9ff724fb4c48b8da74c98b621cddff271942047617f04443ba3b1ed0b8f70d4d.exe

    • Size

      300KB

    • MD5

      d128291a5d60b17b22dccbedd7b711fd

    • SHA1

      7ee96b938de052f70026664b8a4f3be6a80a6596

    • SHA256

      9ff724fb4c48b8da74c98b621cddff271942047617f04443ba3b1ed0b8f70d4d

    • SHA512

      9c95023be796fbd58a5fee7a02161be17612b008609531043bfe44d25c7aca7c2c62e2d0f64d6cb1c5efda6089c826618d5aa48cbe171a0025e6356d66a25a5c

    • SSDEEP

      3072:6cZqf7D34Np/0+mAUkywpgQEgjpB1fA0PuTVAtkxzy3RseqiOL2bBOA:6cZqf7DIXn7TRB1fA0GTV8kgUL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks