General

  • Target

    1e612d162ccd5fecbc1ad6d7ee5378c5

  • Size

    382KB

  • Sample

    231225-a8psmadhck

  • MD5

    1e612d162ccd5fecbc1ad6d7ee5378c5

  • SHA1

    6f88eb2e1239bb6286c3f5eac3a936871376b23e

  • SHA256

    2f1fc9fde3200d0e27ded0ed85907af5d561f356c6bf073febc23d5bfcf408ee

  • SHA512

    9bc3097cb91e41fbd4bd1df80129d2266e93d12988ce3fd514793c8e12ac9dbe6111b5c99343a412246cda6840d8c9df9c84cb9558be4c600c44e346f20424fc

  • SSDEEP

    6144:E3xt1xciMdbh/GscVusLXC4QhIAGBqM4U4ru/05rz7J86HSSA9+dvnYU5fz:E7XcbdbFJcV1C4pAGZyW0dx8gSSI+RYu

Malware Config

Extracted

Family

redline

Botnet

CUC

C2

185.215.113.45:41009

Targets

    • Target

      1e612d162ccd5fecbc1ad6d7ee5378c5

    • Size

      382KB

    • MD5

      1e612d162ccd5fecbc1ad6d7ee5378c5

    • SHA1

      6f88eb2e1239bb6286c3f5eac3a936871376b23e

    • SHA256

      2f1fc9fde3200d0e27ded0ed85907af5d561f356c6bf073febc23d5bfcf408ee

    • SHA512

      9bc3097cb91e41fbd4bd1df80129d2266e93d12988ce3fd514793c8e12ac9dbe6111b5c99343a412246cda6840d8c9df9c84cb9558be4c600c44e346f20424fc

    • SSDEEP

      6144:E3xt1xciMdbh/GscVusLXC4QhIAGBqM4U4ru/05rz7J86HSSA9+dvnYU5fz:E7XcbdbFJcV1C4pAGZyW0dx8gSSI+RYu

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks