General

  • Target

    55afc20e818cea7b01b2089c75b5ccf8

  • Size

    397KB

  • Sample

    231226-fhdkkahfb4

  • MD5

    55afc20e818cea7b01b2089c75b5ccf8

  • SHA1

    42d6d20e53ccdc42842a9a8796cb3efd7037ef8a

  • SHA256

    d9f2871b9596e9ec70eaec676fd6a237e93602bffc51ada87819d5feecd73ab4

  • SHA512

    e83dd3c9ec93d652a6862bfe1551c750b58f408090d9fe60982e9d294f764c5f501fc5d2884e7ad47b405a403e1857edd973f78f0f61ea54a2052ed7d0ba800d

  • SSDEEP

    6144:p0U+uBfnjrVK8f74DbO2df6/zzCietiuH5r/aa0mj0gmPNqNKsfqdDcaxraSioT:A2fn3tf712Y/zud/HdvSYNKoqe9o

Malware Config

Extracted

Family

redline

Botnet

CUC

C2

185.215.113.45:41009

Targets

    • Target

      55afc20e818cea7b01b2089c75b5ccf8

    • Size

      397KB

    • MD5

      55afc20e818cea7b01b2089c75b5ccf8

    • SHA1

      42d6d20e53ccdc42842a9a8796cb3efd7037ef8a

    • SHA256

      d9f2871b9596e9ec70eaec676fd6a237e93602bffc51ada87819d5feecd73ab4

    • SHA512

      e83dd3c9ec93d652a6862bfe1551c750b58f408090d9fe60982e9d294f764c5f501fc5d2884e7ad47b405a403e1857edd973f78f0f61ea54a2052ed7d0ba800d

    • SSDEEP

      6144:p0U+uBfnjrVK8f74DbO2df6/zzCietiuH5r/aa0mj0gmPNqNKsfqdDcaxraSioT:A2fn3tf712Y/zud/HdvSYNKoqe9o

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks