General

  • Target

    925f026ee371367364ea2552f9720818b3b17f1bc7b75de1938e73facf9e55b3.zip

  • Size

    43KB

  • Sample

    230329-mxbg3she6z

  • MD5

    4dc46354f5a3dd4ae6d7c09a7c7bd095

  • SHA1

    7ff2807e6bf9d99460d339bb5265387cbfebfb79

  • SHA256

    9c403be040ad88478922e47dbf7630e2b32ad3af9bd34acca331a8ebc280ae4b

  • SHA512

    f2ca8423701e77b1085460221a805de48bc275d16dc50761f3300933528fabd58f131a1bca21ff560ba65823a2d6130563044fe3f0874f0d51ee57426490a9b1

  • SSDEEP

    768:FSYu+f+aWGuS0FrCsZyEh5fnub3Vbwj2U5zc5IEWvg6iCqZU1eQ20jB/JFzn21sn:FS3+f+aWpSmrC5PDyjNc5IETEjxJBn2w

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

15.229.47.242:10010

Targets

    • Target

      925f026ee371367364ea2552f9720818b3b17f1bc7b75de1938e73facf9e55b3

    • Size

      95KB

    • MD5

      46c08c508d3499e1f4c6b50a60310b7a

    • SHA1

      e075354372bded3e06e247a3fb678486b8487c39

    • SHA256

      925f026ee371367364ea2552f9720818b3b17f1bc7b75de1938e73facf9e55b3

    • SHA512

      aaf9ddfb7326faced9b1d69e7ba2fd56b319bf10a1f46db09ef793f3c67775aa2b541f673ae05e4f4b58cb2d3ecfb62a27f31350a18dc1caa630e74044e5462c

    • SSDEEP

      1536:9qsINqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2g3teulgS6pY:rAMOY3+zi0ZbYe1g0ujyzdOY

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks