General

  • Target

    c5b428a088b9ccf931871d1a6fef3f99

  • Size

    403KB

  • Sample

    241105-khsrpsxlfy

  • MD5

    c5b428a088b9ccf931871d1a6fef3f99

  • SHA1

    af8eeae3beaedc5d8ad7a39012fc802cdd73becd

  • SHA256

    7c6360b65d2013abad142ea597e8c3c6672356cfcdc2f9ee0deac19b7b3a832b

  • SHA512

    351726f6cb5be39fe6f3e1852ab13a2839b7382922d5fd1fe94830dae76e9b63e5e399c94b54cec82684371ebb6870cbef0dc0142a465089b9de7adc0c4caf5b

  • SSDEEP

    6144:hUuE9juHZZGkAaEG7ql6iqOeyvjuIcFLzhFpj6vZHsMrON:muEQHZssEyqlNhLuPFL9FAvZHs4ON

Malware Config

Extracted

Family

redline

Botnet

SEWPALPADIN

C2

45.9.20.112:57175

Attributes
  • auth_value

    5690233e096f92772f1ad7a4afefede9

Targets

    • Target

      c5b428a088b9ccf931871d1a6fef3f99

    • Size

      403KB

    • MD5

      c5b428a088b9ccf931871d1a6fef3f99

    • SHA1

      af8eeae3beaedc5d8ad7a39012fc802cdd73becd

    • SHA256

      7c6360b65d2013abad142ea597e8c3c6672356cfcdc2f9ee0deac19b7b3a832b

    • SHA512

      351726f6cb5be39fe6f3e1852ab13a2839b7382922d5fd1fe94830dae76e9b63e5e399c94b54cec82684371ebb6870cbef0dc0142a465089b9de7adc0c4caf5b

    • SSDEEP

      6144:hUuE9juHZZGkAaEG7ql6iqOeyvjuIcFLzhFpj6vZHsMrON:muEQHZssEyqlNhLuPFL9FAvZHs4ON

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks