General

  • Target

    56de19d77148be736be4d18f7c99e8a7e3a11371298497f9dd62e055d1aa7938

  • Size

    250KB

  • Sample

    241106-nygk6azbrh

  • MD5

    5f6533f60017ae1ace1e9370daa0b8aa

  • SHA1

    9bb7fd4db0d97d9aad79c42a353241f561b7c9bf

  • SHA256

    56de19d77148be736be4d18f7c99e8a7e3a11371298497f9dd62e055d1aa7938

  • SHA512

    2cefd34fbc9df66ace0906f34f683e2c83f2c98fe74a96d134816f159ddae5b81b9376e8c4f93168fdc8b8429d9fcd673f33ba5461c493d02e75008dd52995b0

  • SSDEEP

    6144:Qnk9uKkNLXiaYXmKLV8BCuO25XZvDZKesQIGiXk:QnyubLyaYWUaBC9IXF1LiXk

Malware Config

Extracted

Family

redline

Botnet

SewPalpadin

C2

185.215.113.29:26828

Attributes
  • auth_value

    7a741aa449c2131b60755b6dc189af74

Targets

    • Target

      3826bb2519e4cd674d6bcaea8407b8e4663742852fab1670457aca68ecaf5b16

    • Size

      404KB

    • MD5

      77356d65b7245500fe48ab146c4fdc3d

    • SHA1

      a7b575ecceba538f32705d6adc2bd4b33c25d545

    • SHA256

      3826bb2519e4cd674d6bcaea8407b8e4663742852fab1670457aca68ecaf5b16

    • SHA512

      92416b6f3d4f2ab5c53e05256396475d6417f9831e7d3114eaf280aae79e3be8955e449e18e747411073474d06497b104355f2d66e714f70aead4f7fcb7662ff

    • SSDEEP

      6144:HGziDejVtr7OPraY53SSNVN5eDvx/OzlIM0AF:6patpNjUDvx/OX0A

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks