General

  • Target

    03f6e596a5a8e7c44cd51e4de23b5dc9

  • Size

    379KB

  • Sample

    231229-zwnggaadhp

  • MD5

    03f6e596a5a8e7c44cd51e4de23b5dc9

  • SHA1

    345bc3ac7391a42734c312ba615785ea064c149a

  • SHA256

    460bb62c118015fd6d17010f323b557c3617846cd767b3ede3b77545a82b303c

  • SHA512

    04bd985d8fccfd6e496f2be21d65471d9c77ef6d45e4b21aa6d92e6adfcf1de631481c78ae3d12c27eb2ca230cfde37417646f7abb55b8636af822133e762c65

  • SSDEEP

    6144:VM5XL99SlhUfR1GdvYEet5nmrfVE9eHUzZOtwtwoGVc+6NrL0MvMSyySPE:G0hsR1GdvYEq5n+E9eHUzZO+twoGVc+

Malware Config

Extracted

Family

redline

Botnet

@Catlsp

C2

46.8.19.177:41228

Targets

    • Target

      03f6e596a5a8e7c44cd51e4de23b5dc9

    • Size

      379KB

    • MD5

      03f6e596a5a8e7c44cd51e4de23b5dc9

    • SHA1

      345bc3ac7391a42734c312ba615785ea064c149a

    • SHA256

      460bb62c118015fd6d17010f323b557c3617846cd767b3ede3b77545a82b303c

    • SHA512

      04bd985d8fccfd6e496f2be21d65471d9c77ef6d45e4b21aa6d92e6adfcf1de631481c78ae3d12c27eb2ca230cfde37417646f7abb55b8636af822133e762c65

    • SSDEEP

      6144:VM5XL99SlhUfR1GdvYEet5nmrfVE9eHUzZOtwtwoGVc+6NrL0MvMSyySPE:G0hsR1GdvYEq5n+E9eHUzZO+twoGVc+

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks