General

  • Target

    ac50deb6d5d15b69802dc10de3204f60

  • Size

    416KB

  • Sample

    231219-1p98bsbcgr

  • MD5

    ac50deb6d5d15b69802dc10de3204f60

  • SHA1

    26ec15a2f3db3204d69cd07fba3e8ea6a87e84a6

  • SHA256

    a21aa1682cf7dfa5612a09a76ab966397ba78952810284659237571639ce9cdb

  • SHA512

    82ae8305b612e771574d186c2b7e95e58be1406f55d848e9cb3710d5a81126d79d2c08077a44c9d370ed192752449e2fde76d1474164a1a714edc73c63e31c7c

  • SSDEEP

    6144:MoOh4MHI/BrQoeMw5MVN8NQvTG5tmwfCagsiuyOl54YodKyV0P7zFA:8+MHI5APg8UG5tmICagsi2lIdKyVE

Malware Config

Extracted

Family

redline

Botnet

paladin

C2

178.63.26.132:29795

Attributes
  • auth_value

    f27db372188045eefdf974196ead3dae

Targets

    • Target

      ac50deb6d5d15b69802dc10de3204f60

    • Size

      416KB

    • MD5

      ac50deb6d5d15b69802dc10de3204f60

    • SHA1

      26ec15a2f3db3204d69cd07fba3e8ea6a87e84a6

    • SHA256

      a21aa1682cf7dfa5612a09a76ab966397ba78952810284659237571639ce9cdb

    • SHA512

      82ae8305b612e771574d186c2b7e95e58be1406f55d848e9cb3710d5a81126d79d2c08077a44c9d370ed192752449e2fde76d1474164a1a714edc73c63e31c7c

    • SSDEEP

      6144:MoOh4MHI/BrQoeMw5MVN8NQvTG5tmwfCagsiuyOl54YodKyV0P7zFA:8+MHI5APg8UG5tmICagsi2lIdKyVE

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks