General

  • Target

    b0ea212fbe7c4059d1b25a5afcb1b00040e8b501c8f3af73d930ea0daf41fe10.zip

  • Size

    43KB

  • Sample

    230329-tmgpnsha23

  • MD5

    9c14e17929e32070a91379921ee8068a

  • SHA1

    9d53bfe5b85dd429069a95877d359271396ffa9f

  • SHA256

    f5390691bcb2159fe21241dbe4df39d221744233615ea97599790a9badeef778

  • SHA512

    c03a36bd2ad33f3b02726916277002a2f99c625850491bd4e89b8c36ab392ff19e68de15dfd2ae885a1b20d22f757ffcd0d914da1d3639be2c2777cdb78b1000

  • SSDEEP

    768:CqUzOteZoel7g75F1bQrZfWC8p3m98+lhKZsbD2m3N7cMkTJVy:CzzOy7g7zGr8VK8+lhKZsbD221cMUJVy

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

127.0.0.1:1337

Targets

    • Target

      b0ea212fbe7c4059d1b25a5afcb1b00040e8b501c8f3af73d930ea0daf41fe10

    • Size

      95KB

    • MD5

      dceaf7cfb7ca66270f86b0fafc421cec

    • SHA1

      824177a36e2ffa4bb228801219dab0d4cbff2640

    • SHA256

      b0ea212fbe7c4059d1b25a5afcb1b00040e8b501c8f3af73d930ea0daf41fe10

    • SHA512

      dcec2035eac36211057fbe735cf25486f4ed077e9e84b6475849543030ce4a47d869e35d19f4dd495237a58fb1f2224eedb324500d7ad00711ee0acc1f0dafb9

    • SSDEEP

      1536:1qsGfq+TmlbG6jejoigI/43Ywzi0Zb78ivombfexv0ujXyyed2T3tmulgS6pg:z0taY/+zi0ZbYe1g0ujyzdLg

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks