General

  • Target

    f8f5ea7b4dd40b42ab8937036b05391a

  • Size

    841KB

  • Sample

    231228-z7gs3agdak

  • MD5

    f8f5ea7b4dd40b42ab8937036b05391a

  • SHA1

    c7d2e4d5269e4535792d1aedeef776c00a3dc08e

  • SHA256

    1224cdecf59f5e3198dbce3e1f0b3d53eab47d4291fcf4bd0ce517a88e280b10

  • SHA512

    30ba183d28edff25ed8568f93cd3c492eef5a54a1b25097c59d832dfce8f4d99a2bd84d76a743803be4b1ac3e44b960b8df5acea2e5b020fa1cdb978566021dc

  • SSDEEP

    12288:N5tMjaV02iNv4sNuA76J+Q7p9DGfTMrE1u/4d6YO4pbytTS2uftGFUYlrr:D1V01usAA76JhTDoTMEMw6YOgyVS2f

Malware Config

Extracted

Family

redline

Botnet

@ekzzz44

C2

95.215.207.185:64399

Targets

    • Target

      f8f5ea7b4dd40b42ab8937036b05391a

    • Size

      841KB

    • MD5

      f8f5ea7b4dd40b42ab8937036b05391a

    • SHA1

      c7d2e4d5269e4535792d1aedeef776c00a3dc08e

    • SHA256

      1224cdecf59f5e3198dbce3e1f0b3d53eab47d4291fcf4bd0ce517a88e280b10

    • SHA512

      30ba183d28edff25ed8568f93cd3c492eef5a54a1b25097c59d832dfce8f4d99a2bd84d76a743803be4b1ac3e44b960b8df5acea2e5b020fa1cdb978566021dc

    • SSDEEP

      12288:N5tMjaV02iNv4sNuA76J+Q7p9DGfTMrE1u/4d6YO4pbytTS2uftGFUYlrr:D1V01usAA76JhTDoTMEMw6YOgyVS2f

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks