General

  • Target

    0366013a315bfd1c6d74e02339c10bc3

  • Size

    283KB

  • Sample

    231229-zfngjahed2

  • MD5

    0366013a315bfd1c6d74e02339c10bc3

  • SHA1

    77b323c721ecf1c6c56158a6a1e2d0ce9cf0bf36

  • SHA256

    d1b5492aa58d4b83f4f72d18a961622e034f22d50436dd527cbaa669cc9987f0

  • SHA512

    b5c1b46992d9c44353053197a26f951e93e143adfae85cb0814a3a8aff9402a2283c23afdca406b3a4513fb849eebb65e46f6733a16c40b1d5ba891a2323b797

  • SSDEEP

    6144:/xZh6Q6von8kz96rAYwc5lzbBADYD953RY2xG3a2VXfFsrWM:J6QuSklJ55VAz3aKFsrWM

Malware Config

Extracted

Family

redline

Botnet

prolivYT

C2

188.165.229.219:31829

Targets

    • Target

      0366013a315bfd1c6d74e02339c10bc3

    • Size

      283KB

    • MD5

      0366013a315bfd1c6d74e02339c10bc3

    • SHA1

      77b323c721ecf1c6c56158a6a1e2d0ce9cf0bf36

    • SHA256

      d1b5492aa58d4b83f4f72d18a961622e034f22d50436dd527cbaa669cc9987f0

    • SHA512

      b5c1b46992d9c44353053197a26f951e93e143adfae85cb0814a3a8aff9402a2283c23afdca406b3a4513fb849eebb65e46f6733a16c40b1d5ba891a2323b797

    • SSDEEP

      6144:/xZh6Q6von8kz96rAYwc5lzbBADYD953RY2xG3a2VXfFsrWM:J6QuSklJ55VAz3aKFsrWM

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks