General

  • Target

    Laplas - 08.12.2022 (FUD 3 of 71).zip

  • Size

    643KB

  • Sample

    241210-m2ys6stnc1

  • MD5

    5c2ed2918e16a5391a075cac5ea253f8

  • SHA1

    65b69a1fbc7c7192ba16d3d82bbc5311b34ee6c6

  • SHA256

    ff505670ae62fd1bfca0bf10d8cfb7874e3f5d5c823f5c8acf9e796cda5a1943

  • SHA512

    f1a75b9246810613b1862c357d313ef1a681e60992a24d597380b5bcdb7e302918c3e74a7739428573e015cccf1672b789277169fee8f0db91c2f207f66189ec

  • SSDEEP

    12288:w4LBZbIh5ct/eSQQt5bTy4fp+4IC1oT6YXGZzZ48WMPLJOP:w4LLbC5AJb+4fpjIsoTTXGZl4GLJOP

Malware Config

Extracted

Family

redline

Botnet

@dsadasdasd1

C2

45.15.156.155:80

Attributes
  • auth_value

    e2637596f93702084676494f7e0c2dfd

Targets

    • Target

      setup.eexe

    • Size

      1.1MB

    • MD5

      8402ded9b2f0c07d7aca42ffc021faa7

    • SHA1

      3da8599a38ad4c3a51ea4316273d648982aa3161

    • SHA256

      aa8480766448a63a9e7d3f5463ceb7c0539148d42412cfe4ec9572edf97f4bba

    • SHA512

      68e23954f73259708bdc4d384c10442d8d06a40a540758925126e58769b9f6dd3f6f8a3a2beebc28029ba97e657ff173de1dc2ad793f20da0581317df5161d26

    • SSDEEP

      24576:drbA4ECQP2Qh7C0zobAtHOMDuhvZ33XYdE/fLKi+3JG7Dc:BWP2Qh7CSobsCh1F3MCDc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks