General

  • Target

    5e4bd7c6f638b2be91efb1fad6d623b8

  • Size

    338KB

  • Sample

    231219-t2b3qshad6

  • MD5

    5e4bd7c6f638b2be91efb1fad6d623b8

  • SHA1

    e7198411a47aff4ddf8db8b03a9758c0d7b9bcf3

  • SHA256

    734d84a8d02283d3da721d5118b2b1c512f4b3a526e93cff8f798ea3ad31cc9c

  • SHA512

    39012c2c121cc902a7b53987fe190ae83b66da3bae7e7329f27ba5519db0288f5df006e93fff3e9b50c424831fad01c9628710c979bd082a62a6de9b7297a603

  • SSDEEP

    6144:LvAIxGgqxg5gOh70h7J60kWPBPrG6e79G/9Me8qD7hzG8Ys:LYafqxg5T70h8EPBPrRr9Me8oFG89

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      5e4bd7c6f638b2be91efb1fad6d623b8

    • Size

      338KB

    • MD5

      5e4bd7c6f638b2be91efb1fad6d623b8

    • SHA1

      e7198411a47aff4ddf8db8b03a9758c0d7b9bcf3

    • SHA256

      734d84a8d02283d3da721d5118b2b1c512f4b3a526e93cff8f798ea3ad31cc9c

    • SHA512

      39012c2c121cc902a7b53987fe190ae83b66da3bae7e7329f27ba5519db0288f5df006e93fff3e9b50c424831fad01c9628710c979bd082a62a6de9b7297a603

    • SSDEEP

      6144:LvAIxGgqxg5gOh70h7J60kWPBPrG6e79G/9Me8qD7hzG8Ys:LYafqxg5T70h8EPBPrRr9Me8oFG89

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks