General

  • Target

    536a198ea9f67dc3403b894d2e4e5fc4.bin

  • Size

    43KB

  • Sample

    230412-csr9xsha55

  • MD5

    d64fd83503709573405373bccfb7e9f9

  • SHA1

    8219fea6bc7073baffa4a8ee8673d3889f18bbb3

  • SHA256

    d7fe2d02eddb9017b0877e92ef2bc21f0c28ad3435f8f5f78acc3bf91a3b0701

  • SHA512

    af6f537d7883c07fb5075700f88df544f8566e0be5763e0a8b0acc753d30feaa139d1c4b51104bf42ff0f4589a5b63b0f8558668c6551e1ea74970746570f1d0

  • SSDEEP

    768:S9rURsMRYIhSf6WHdmRlkIMl2/Sffiiu9n6sYQOGNE0wdPbR3mbDwqHh:UHMj8f6WHkQ84e9n6sl60W3kDww

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

135.148.89.82:60386

Targets

    • Target

      5112ff1b75d9c33d10efafcbacdb4e2116280c1f5f3e6b6a64b44279997d96ee.exe

    • Size

      95KB

    • MD5

      536a198ea9f67dc3403b894d2e4e5fc4

    • SHA1

      82ca68f5d10ab1baeeaae042bb0fac595db10ea0

    • SHA256

      5112ff1b75d9c33d10efafcbacdb4e2116280c1f5f3e6b6a64b44279997d96ee

    • SHA512

      de8fd56a76b64076ee66ee69b361f2616f8fc668f819b4173e824568844d872e9782ac7d210bc69703d373e19fe9e43bff61668f904238e8899aa1f5a782f768

    • SSDEEP

      1536:9qsINqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed243teulgS6pY:rAMOY3+zi0ZbYe1g0ujyzdGY

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks