General

  • Target

    e6bd7a442e04eba451aa1f63819533b086c5a60fd9fa7506fa838515184e1836

  • Size

    95KB

  • Sample

    231103-erxjcsbh7s

  • MD5

    1199c88022b133b321ed8e9c5f4e6739

  • SHA1

    8e5668edc9b4e1f15c936e68b59c84e165c9cb07

  • SHA256

    e6bd7a442e04eba451aa1f63819533b086c5a60fd9fa7506fa838515184e1836

  • SHA512

    7aa8c3ed3a2985bb8a62557fd347d1c90790cd3f5e3b0b70c221b28cb17a0c163b8b1bac45bc014148e08105232e9abef33408a4d648ddc5362795e5669e3697

  • SSDEEP

    1536:Fqskaq+A/lbG6jejoigIP43Ywzi0Zb78ivombfexv0ujXyyed2kteulgS6pQl:D7ZeYP+zi0ZbYe1g0ujyzd0Q

Malware Config

Extracted

Family

redline

Botnet

pixelscloud

C2

85.209.176.171:80

Targets

    • Target

      e6bd7a442e04eba451aa1f63819533b086c5a60fd9fa7506fa838515184e1836

    • Size

      95KB

    • MD5

      1199c88022b133b321ed8e9c5f4e6739

    • SHA1

      8e5668edc9b4e1f15c936e68b59c84e165c9cb07

    • SHA256

      e6bd7a442e04eba451aa1f63819533b086c5a60fd9fa7506fa838515184e1836

    • SHA512

      7aa8c3ed3a2985bb8a62557fd347d1c90790cd3f5e3b0b70c221b28cb17a0c163b8b1bac45bc014148e08105232e9abef33408a4d648ddc5362795e5669e3697

    • SSDEEP

      1536:Fqskaq+A/lbG6jejoigIP43Ywzi0Zb78ivombfexv0ujXyyed2kteulgS6pQl:D7ZeYP+zi0ZbYe1g0ujyzd0Q

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks