General

  • Target

    08f089589dda0d849bf735d27c71152bc47f7c71e676a0ee8bc502b422f454c1.zip

  • Size

    43KB

  • Sample

    230329-r6nwzsgg44

  • MD5

    1bdfa77bfc7d5b69ff98849b1eb33ef3

  • SHA1

    48e53a793ad29f90ebd033c9268ba4c0c2261e2b

  • SHA256

    4782cfc3ded91b14fddc012c8f7e6752f830c097874456ad3e9aedd50294be27

  • SHA512

    2b070e62041d1f494f3922300382e88a45559ee333268d029da71b79949bcab8b7e0ddcff91ffee96209f05d1d500da503df1f8e6968336594151c320f9c8863

  • SSDEEP

    768:9O74khJb1ft/c6GGBjDKsdUb3m/1ul0zhpY4HG7aNzfEuxHgCfvx7Tn2:MLb1ftULiBUb3E1S0NpRTNxdn2

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.141.215.79:1639

Targets

    • Target

      08f089589dda0d849bf735d27c71152bc47f7c71e676a0ee8bc502b422f454c1

    • Size

      95KB

    • MD5

      5d2d319a57180973471a07b00b9c9d08

    • SHA1

      481c355baf245d307b15ea653ddbe1c3282a0914

    • SHA256

      08f089589dda0d849bf735d27c71152bc47f7c71e676a0ee8bc502b422f454c1

    • SHA512

      3e686b023537e0f7ca0bb37694c0a3be470a7c05f5a179bf6b2a93200428457b4f0ab771ef1b8fb2d8047d10565c54512b408bc49eb1f805badb32ff54667ae1

    • SSDEEP

      1536:9qs+XqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2Q3tmulgS6pY:r0gzWHY3+zi0ZbYe1g0ujyzdiY

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks