General

  • Target

    e9750d88c08e5b5980c9a5afaaee29b7

  • Size

    358KB

  • Sample

    231220-t3lzbsfde7

  • MD5

    e9750d88c08e5b5980c9a5afaaee29b7

  • SHA1

    201956cf20f78b943df56430b9ee641a0b26ab70

  • SHA256

    c5bf00f84ef6514a7eb67e7913c5c2558f365a116b6592be387f264faf18b5f2

  • SHA512

    381755a032d6d7b9f95d51b0bf5948dbb09f829e186781710b103f6c0fc3060d9e2186cd27a45bcccf3cb80fa5aec03d58110d2360615d3a0d998935d6c642b1

  • SSDEEP

    6144:K1Qegph/CWrkc1yE5W7RhfK1qG+tPhKTCfpBD0PiYsaKWjMhWvXSahO+Xe5H37d:UbKdCWrkc1yE5W7RhUqG+tPTYP8WjMGQ

Malware Config

Extracted

Family

redline

Botnet

paladin

C2

178.63.26.132:29795

Targets

    • Target

      e9750d88c08e5b5980c9a5afaaee29b7

    • Size

      358KB

    • MD5

      e9750d88c08e5b5980c9a5afaaee29b7

    • SHA1

      201956cf20f78b943df56430b9ee641a0b26ab70

    • SHA256

      c5bf00f84ef6514a7eb67e7913c5c2558f365a116b6592be387f264faf18b5f2

    • SHA512

      381755a032d6d7b9f95d51b0bf5948dbb09f829e186781710b103f6c0fc3060d9e2186cd27a45bcccf3cb80fa5aec03d58110d2360615d3a0d998935d6c642b1

    • SSDEEP

      6144:K1Qegph/CWrkc1yE5W7RhfK1qG+tPhKTCfpBD0PiYsaKWjMhWvXSahO+Xe5H37d:UbKdCWrkc1yE5W7RhUqG+tPTYP8WjMGQ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks