General

  • Target

    c9fe7eb74c431a8edfce9d4963659215c1415e168e98308c75c68781b5a46e66

  • Size

    298KB

  • Sample

    241109-kpdalatrap

  • MD5

    2ccc7d7fe37eae38eb705e54ee284ca0

  • SHA1

    36e0747de957a33c1ea545d212d097922a04644a

  • SHA256

    c9fe7eb74c431a8edfce9d4963659215c1415e168e98308c75c68781b5a46e66

  • SHA512

    5a9a4b93292fec4399764e711ea5bd5d578a72ab6abfd0a768976f749b29148280114ce7e9aa4e26b2a6e9b0e9e9d9d03de900c805a9bd548bfb75ad879456c3

  • SSDEEP

    6144:52ECIjjW+LuLIe0T1eXwp8bXk3X4G1cmL2Gp2eT:5FCIjjW6vTHcmLxAe

Malware Config

Extracted

Family

redline

Botnet

1

C2

45.9.20.59:46287

Attributes
  • auth_value

    ec6ada170bcec2e72f0e1f3954547f73

Targets

    • Target

      c9fe7eb74c431a8edfce9d4963659215c1415e168e98308c75c68781b5a46e66

    • Size

      298KB

    • MD5

      2ccc7d7fe37eae38eb705e54ee284ca0

    • SHA1

      36e0747de957a33c1ea545d212d097922a04644a

    • SHA256

      c9fe7eb74c431a8edfce9d4963659215c1415e168e98308c75c68781b5a46e66

    • SHA512

      5a9a4b93292fec4399764e711ea5bd5d578a72ab6abfd0a768976f749b29148280114ce7e9aa4e26b2a6e9b0e9e9d9d03de900c805a9bd548bfb75ad879456c3

    • SSDEEP

      6144:52ECIjjW+LuLIe0T1eXwp8bXk3X4G1cmL2Gp2eT:5FCIjjW6vTHcmLxAe

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks