General

  • Target

    032f6f4e253daadcd4bbfe5ddd183e58

  • Size

    360KB

  • Sample

    231219-mc9t5sbfb8

  • MD5

    032f6f4e253daadcd4bbfe5ddd183e58

  • SHA1

    25d04f90b1dfdf38b2da774355c1809c40fcdfa4

  • SHA256

    7138419d7ab8d04660e68e4f530b4993a565bc90661250904233971ddcc6de5b

  • SHA512

    b841851b50e344f23dce09eaf14833eccb8cbae59d45f3f7550c39bf86575dbbeb8e75381a6c2d514a28f16dc68e0a0fd89fe12e2ddb6f4e912bf12fefe747c1

  • SSDEEP

    6144:jaOrd9LehMIYiwQj9ERbMzYtNTqNIDyIiDxTZ+UxbQ4qaF9Sn0zl19pDJ8wsu:jDHLehzYiwmEbMzYTGlIiZ+UxZUn0B1j

Malware Config

Extracted

Family

redline

Botnet

4

C2

80.87.192.249:16640

Attributes
  • auth_value

    3e4c638c72124e45bcf5164456741cce

Targets

    • Target

      032f6f4e253daadcd4bbfe5ddd183e58

    • Size

      360KB

    • MD5

      032f6f4e253daadcd4bbfe5ddd183e58

    • SHA1

      25d04f90b1dfdf38b2da774355c1809c40fcdfa4

    • SHA256

      7138419d7ab8d04660e68e4f530b4993a565bc90661250904233971ddcc6de5b

    • SHA512

      b841851b50e344f23dce09eaf14833eccb8cbae59d45f3f7550c39bf86575dbbeb8e75381a6c2d514a28f16dc68e0a0fd89fe12e2ddb6f4e912bf12fefe747c1

    • SSDEEP

      6144:jaOrd9LehMIYiwQj9ERbMzYtNTqNIDyIiDxTZ+UxbQ4qaF9Sn0zl19pDJ8wsu:jDHLehzYiwmEbMzYTGlIiZ+UxZUn0B1j

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks