General

  • Target

    cc6d6e58e4a27c1b56bc2aa5a1c2ec6097cd9fe3b5d6ae780b90107e18cbcbde.zip

  • Size

    43KB

  • Sample

    230329-nfzc9ahf5x

  • MD5

    f68a1f1130c1da235e95038b092f19a0

  • SHA1

    7a482a483501b90b9bef2d56d88fd345b753e2de

  • SHA256

    30ff0acab5afcffeed595e5cca97729d2de29a7d06f7526c900084695a5abcde

  • SHA512

    96ea47723a9eaf936fa9eafb0f4f7d49ca25af0da4115b4d90698e29778bc507c3dcb43b91e93dbc5cb7f417804423f15abd696e87f4b5344114c47bf44c846e

  • SSDEEP

    768:OQwDY61nnJcTjCyvYzsX8Tt8H4SXO+pky0aoG6QwmiApMW3oD:xwDRNg96XhG1NiAqD

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

192.168.1.4:35361

Targets

    • Target

      cc6d6e58e4a27c1b56bc2aa5a1c2ec6097cd9fe3b5d6ae780b90107e18cbcbde

    • Size

      95KB

    • MD5

      aa931785c15fff621c5cc39d2b06531a

    • SHA1

      edf60f31d86a592e852c043a0e119359695763e8

    • SHA256

      cc6d6e58e4a27c1b56bc2aa5a1c2ec6097cd9fe3b5d6ae780b90107e18cbcbde

    • SHA512

      b334193e0e29b56910f583d1e33fb5fc8e65d430cf3fb955e4c5777ec200aff855667b5f7af1c4a56d7adcff210363ef4da4d31f77a6b89976090bf6693151f8

    • SSDEEP

      1536:xqskjlqzWlbG6jejoigIr43Ywzi0Zb78ivombfexv0ujXyyed2U3teulgS6pk:fYUeYr+zi0ZbYe1g0ujyzdak

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks