General

  • Target

    93281613f3db5b5e7cb5abd9bb56d5ab

  • Size

    313KB

  • Sample

    231219-y53r3sffg3

  • MD5

    93281613f3db5b5e7cb5abd9bb56d5ab

  • SHA1

    d63e61cd5c9983930e807f1177077ef3a5469c9a

  • SHA256

    1d02174bb9c9612cdb79571982a940d1926e366d9b8b2f2b4a92e8bac2d4122c

  • SHA512

    bd750fcb00d0c03e970ce5fce1218dd6389b1a8dca0c48b993cc8ab0f8daa95d544b4868fcb9b04ef9dcca883c93d19db7b92268f886c51824c75cb626d23308

  • SSDEEP

    6144:nNtdwy0tbOmsE/6sOSzdfkT8g2i309MAN9CJQYlNIqN/bhpKIa:n7uXtbOmUsOSzZk229AfzUSwhpKj

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      93281613f3db5b5e7cb5abd9bb56d5ab

    • Size

      313KB

    • MD5

      93281613f3db5b5e7cb5abd9bb56d5ab

    • SHA1

      d63e61cd5c9983930e807f1177077ef3a5469c9a

    • SHA256

      1d02174bb9c9612cdb79571982a940d1926e366d9b8b2f2b4a92e8bac2d4122c

    • SHA512

      bd750fcb00d0c03e970ce5fce1218dd6389b1a8dca0c48b993cc8ab0f8daa95d544b4868fcb9b04ef9dcca883c93d19db7b92268f886c51824c75cb626d23308

    • SSDEEP

      6144:nNtdwy0tbOmsE/6sOSzdfkT8g2i309MAN9CJQYlNIqN/bhpKIa:n7uXtbOmUsOSzZk229AfzUSwhpKj

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks