General

  • Target

    3f69a24fc71f7f797fc65140aee79d2f

  • Size

    337KB

  • Sample

    231219-rh2g6scgap

  • MD5

    3f69a24fc71f7f797fc65140aee79d2f

  • SHA1

    a56a90b058ee5dea5626a7a5d94073ed5e3731aa

  • SHA256

    fcd8a9f24f026569234ccdfd5111393dae90c03eab2219f42c12d7aa1f07d9ea

  • SHA512

    53368cf7c861a92e960f5ca95bc1ae76a3a0bfd8a151442c7e503a8b9b74133412aade45e6b5cd2bcdd966f75ee94d0faa168daa75db1032239b4fabf114814f

  • SSDEEP

    6144:1QxXph/2e/zN97FhHK0Ok4rgV8huJCxl1OwZaQr7u3KJ75:1A5d2e/zN97FhtOk4ru8gJs1TZagFJF

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      3f69a24fc71f7f797fc65140aee79d2f

    • Size

      337KB

    • MD5

      3f69a24fc71f7f797fc65140aee79d2f

    • SHA1

      a56a90b058ee5dea5626a7a5d94073ed5e3731aa

    • SHA256

      fcd8a9f24f026569234ccdfd5111393dae90c03eab2219f42c12d7aa1f07d9ea

    • SHA512

      53368cf7c861a92e960f5ca95bc1ae76a3a0bfd8a151442c7e503a8b9b74133412aade45e6b5cd2bcdd966f75ee94d0faa168daa75db1032239b4fabf114814f

    • SSDEEP

      6144:1QxXph/2e/zN97FhHK0Ok4rgV8huJCxl1OwZaQr7u3KJ75:1A5d2e/zN97FhtOk4ru8gJs1TZagFJF

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks