General

  • Target

    76dc0f622277d58ab0e023c4ce4de01d

  • Size

    358KB

  • Sample

    231219-w2pd6sdbel

  • MD5

    76dc0f622277d58ab0e023c4ce4de01d

  • SHA1

    f43184b064d03274307b0894e4e5d02a758bead8

  • SHA256

    b2306259d8e6adb61c862108616fb9bb0e2df5b4d3188c70278b56dd79d87735

  • SHA512

    e5781cde916096e6479220a9f689db753e138e46c5f542395fe6111948b87390636a1fdeb3a83ca94dc0e62f9beb0a8fd6d0f3c0404f5421965d15bf54a0ed5a

  • SSDEEP

    6144:K1Qegph/CWrkc1yE5W7RhfK1qG+tPhKTCfpBD0PiYsaKWjMhWvXSahO+Xe5H37a:UbKdCWrkc1yE5W7RhUqG+tPTYP8WjMGP

Malware Config

Extracted

Family

redline

Botnet

paladin

C2

178.63.26.132:29795

Targets

    • Target

      76dc0f622277d58ab0e023c4ce4de01d

    • Size

      358KB

    • MD5

      76dc0f622277d58ab0e023c4ce4de01d

    • SHA1

      f43184b064d03274307b0894e4e5d02a758bead8

    • SHA256

      b2306259d8e6adb61c862108616fb9bb0e2df5b4d3188c70278b56dd79d87735

    • SHA512

      e5781cde916096e6479220a9f689db753e138e46c5f542395fe6111948b87390636a1fdeb3a83ca94dc0e62f9beb0a8fd6d0f3c0404f5421965d15bf54a0ed5a

    • SSDEEP

      6144:K1Qegph/CWrkc1yE5W7RhfK1qG+tPhKTCfpBD0PiYsaKWjMhWvXSahO+Xe5H37a:UbKdCWrkc1yE5W7RhUqG+tPTYP8WjMGP

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks