General

  • Target

    e431e87b2525048d6d6b96569490b214.bin

  • Size

    43KB

  • Sample

    230723-cv9a8adf31

  • MD5

    73b4be430913c7eb5281584164f99931

  • SHA1

    e5f941b3fab6876d42e26a7cd366ec6790cf921b

  • SHA256

    97b0a9921005e41b0006b40f457c06a25c774f8dd573f60f2049849d6cd588d9

  • SHA512

    39e21285ad37443939c0527de97354ff521ffab80bbd284daf1e0cc67ee7a0171f68e67000898b28c0e8bdceb3150924a19ab0249c1e118fc1d48ebfce64985e

  • SSDEEP

    768:yl3cgs1uNnwd8sWyXGLRNXlvLtPCySD4NG/U1NqoFIvUqSadUoW18kMecAb5abjt:IcONwC4XKXlvLtKySD4kMPFIv/dUPGjd

Malware Config

Extracted

Family

redline

Botnet

crypto logs

C2

85.208.139.125:17960

Targets

    • Target

      58576b8da0d0bb368af4de01802d74121755bff05d255130c35414d28b721c4b.exe

    • Size

      95KB

    • MD5

      e431e87b2525048d6d6b96569490b214

    • SHA1

      f67aae87e0afb9badd0d0e6473dfcd31f2628120

    • SHA256

      58576b8da0d0bb368af4de01802d74121755bff05d255130c35414d28b721c4b

    • SHA512

      594242466aea4e803be5bc8abfeb9e81e016e4f5172c7736388360076cb1d0a9db3dd45df3bce42fe5259ddf8e8963ebb6da74e90c26fa08c141126d56c05e82

    • SSDEEP

      1536:NqsCoqu3lbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2GtmulgS6pIl:731FYH+zi0ZbYe1g0ujyzdCI

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks