General

  • Target

    d4d6e754a3bf9d2c1fca3edb18841b2e

  • Size

    413KB

  • Sample

    231220-sn7f2sgah3

  • MD5

    d4d6e754a3bf9d2c1fca3edb18841b2e

  • SHA1

    0a596d5ea1418104f2d06e945e0f9461677b9938

  • SHA256

    94995350a42e0df7d0626bf864f071d33347bdd44bfe4b4f78006b5c8410a2ee

  • SHA512

    42757bc9dbd2d61d7a3ab3ec881ab3caf432b22b769bb8f58dc15c96c556b7c9777724d560e59ac8aea9ebd1f4474311b37f7908ed820cacb0a1d6e9c42d9f6a

  • SSDEEP

    6144:6p50nupPx02c2kxr/9COFAyjKpyBjniUemrbq0TYVYI7h0i89S:AmupPx0dZRns4jiUlr9TYVYy

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      d4d6e754a3bf9d2c1fca3edb18841b2e

    • Size

      413KB

    • MD5

      d4d6e754a3bf9d2c1fca3edb18841b2e

    • SHA1

      0a596d5ea1418104f2d06e945e0f9461677b9938

    • SHA256

      94995350a42e0df7d0626bf864f071d33347bdd44bfe4b4f78006b5c8410a2ee

    • SHA512

      42757bc9dbd2d61d7a3ab3ec881ab3caf432b22b769bb8f58dc15c96c556b7c9777724d560e59ac8aea9ebd1f4474311b37f7908ed820cacb0a1d6e9c42d9f6a

    • SSDEEP

      6144:6p50nupPx02c2kxr/9COFAyjKpyBjniUemrbq0TYVYI7h0i89S:AmupPx0dZRns4jiUlr9TYVYy

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks