General

  • Target

    dd751eca5c3bf3e51c717ce8da809c75

  • Size

    781KB

  • Sample

    231220-s815rsbhem

  • MD5

    dd751eca5c3bf3e51c717ce8da809c75

  • SHA1

    8a66b16807fe11fd3502012dd667e3e5a5670a4c

  • SHA256

    c6aa9a4f5479081e68ab9f49c0c994f7d794a21d27d32048c6b16e1495653235

  • SHA512

    d642c6e29c22791314f87f280b98130730af8e18ea3f7d725ebeff77010b4db556395949556cec20230541dad9e976eae852185d54402123dd57bb7712efba73

  • SSDEEP

    12288:y1AMrB0OBKyqZjUA8k5J9Jkztifb6cgocJPim48MY5iXFZuf/HnuTN7PqnCks7:yXFfjJPi7rLXufGTN7PRkE

Malware Config

Extracted

Family

redline

Botnet

10

C2

usersoft-usa.info:80

Attributes
  • auth_value

    df36234d4b97493c0b28f7ce2170085d

Targets

    • Target

      dd751eca5c3bf3e51c717ce8da809c75

    • Size

      781KB

    • MD5

      dd751eca5c3bf3e51c717ce8da809c75

    • SHA1

      8a66b16807fe11fd3502012dd667e3e5a5670a4c

    • SHA256

      c6aa9a4f5479081e68ab9f49c0c994f7d794a21d27d32048c6b16e1495653235

    • SHA512

      d642c6e29c22791314f87f280b98130730af8e18ea3f7d725ebeff77010b4db556395949556cec20230541dad9e976eae852185d54402123dd57bb7712efba73

    • SSDEEP

      12288:y1AMrB0OBKyqZjUA8k5J9Jkztifb6cgocJPim48MY5iXFZuf/HnuTN7PqnCks7:yXFfjJPi7rLXufGTN7PRkE

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks