General

  • Target

    e2a0b0235a631a3bf5812548215da200

  • Size

    353KB

  • Sample

    231220-tlavqsabh8

  • MD5

    e2a0b0235a631a3bf5812548215da200

  • SHA1

    5c9e9114a0d9b2e1e834d1bf17226055ab5e3b64

  • SHA256

    52b4e37e00748f6e4b907ced78f457437a7a8ec4cb04769d8e8ff6f04605f54c

  • SHA512

    a3bb90f06d09aae73187c4901d334241e597bff99b0de36e6af343e754384d5e9435f3f17870ff118c142e531d1e5ab7eb529aa96eb9d36954d16c31a6a3f79f

  • SSDEEP

    6144:UvOuBGUc9XITwpoM3qTmEt7dNIIh4MQZ2PJxuobdMFS2J5U2/:UGsLc9XzpROtxhwTobaFSs57/

Malware Config

Extracted

Family

redline

Botnet

paladin

C2

178.63.26.132:29795

Targets

    • Target

      e2a0b0235a631a3bf5812548215da200

    • Size

      353KB

    • MD5

      e2a0b0235a631a3bf5812548215da200

    • SHA1

      5c9e9114a0d9b2e1e834d1bf17226055ab5e3b64

    • SHA256

      52b4e37e00748f6e4b907ced78f457437a7a8ec4cb04769d8e8ff6f04605f54c

    • SHA512

      a3bb90f06d09aae73187c4901d334241e597bff99b0de36e6af343e754384d5e9435f3f17870ff118c142e531d1e5ab7eb529aa96eb9d36954d16c31a6a3f79f

    • SSDEEP

      6144:UvOuBGUc9XITwpoM3qTmEt7dNIIh4MQZ2PJxuobdMFS2J5U2/:UGsLc9XzpROtxhwTobaFSs57/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks