General

  • Target

    4ec3f0b4016b06ed74a234aa1e4aa6b2.exe

  • Size

    98KB

  • Sample

    240109-wsztjsfadr

  • MD5

    4ec3f0b4016b06ed74a234aa1e4aa6b2

  • SHA1

    389604f0e84a5e4fcfbf826dc02598f215b0d2cc

  • SHA256

    9d315185b2c30c599b1bb688730f6f6133b1de17278c212d93381446d97db50b

  • SHA512

    cb1631593ecb926586d5d72cba452306377646d53706923f61febae5d53445d90a16f94ed626cd50866e95cd567b3f0a834ad21c7d36baf45c12f00f8e6394db

  • SSDEEP

    1536:C3LNmoce93PZmcoehFb0a9JFSG3smbfeJvHuvUyyedgd34qCxXsEOG6ijoigX:CxmoczedJIIhoHucyzd8SnU

Malware Config

Extracted

Family

redline

Botnet

client

C2

87.120.37.152:5605

Targets

    • Target

      4ec3f0b4016b06ed74a234aa1e4aa6b2.exe

    • Size

      98KB

    • MD5

      4ec3f0b4016b06ed74a234aa1e4aa6b2

    • SHA1

      389604f0e84a5e4fcfbf826dc02598f215b0d2cc

    • SHA256

      9d315185b2c30c599b1bb688730f6f6133b1de17278c212d93381446d97db50b

    • SHA512

      cb1631593ecb926586d5d72cba452306377646d53706923f61febae5d53445d90a16f94ed626cd50866e95cd567b3f0a834ad21c7d36baf45c12f00f8e6394db

    • SSDEEP

      1536:C3LNmoce93PZmcoehFb0a9JFSG3smbfeJvHuvUyyedgd34qCxXsEOG6ijoigX:CxmoczedJIIhoHucyzd8SnU

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks