General

  • Target

    a95b7d1ef3c4f8932fa97c287dd54c70.bin

  • Size

    1.3MB

  • Sample

    240119-dzm48aehb4

  • MD5

    377bb28c848b6a4c329a1ab510ffd767

  • SHA1

    f4aa223791cb4923197acb38ce36bbd7b5849591

  • SHA256

    b5f33c0aab4ab4cf45b69cba3669f1f7d6fff21a4bfbe69dfec3f088d76a3251

  • SHA512

    53ae8484a265246dccb8c070f2360d219d08852073ce8fd52d0db2bbbfed8128323f9678674eca16b9a228b0b61aba4b7b13600bf04ec183ab18abdae070854a

  • SSDEEP

    24576:A+4i1HnL2d+RLVj+bCNTOqih7070CmxY7dlboSQF/NGzC3uX0fo7VJKhJqqu04:A+fFnRs+VOt070Cmxg4SQN3Zw7bKvqqU

Malware Config

Extracted

Family

redline

Botnet

Exodus

C2

94.156.66.169:1334

Targets

    • Target

      a91ab913b292db7d5791d76bcf96303ce16bddcf84e631ba109a0f0c2eb9563b.exe

    • Size

      2.8MB

    • MD5

      a95b7d1ef3c4f8932fa97c287dd54c70

    • SHA1

      771e6c19fb90aa257f748c41539725f71ca96970

    • SHA256

      a91ab913b292db7d5791d76bcf96303ce16bddcf84e631ba109a0f0c2eb9563b

    • SHA512

      79ed2066fdfa31b9a6045bdbabf0b58b071c0aa947b32a4a585c20892dc6dea62ed6626ec7546cfc2d46c5d356b71b336214c7cd529aa14fb89f83f004ce1e1d

    • SSDEEP

      24576:4oT0RJ0DfNYx0UqU6OOPSxjQmTOcSc9rvjlaWDXvoZWiUI6bp8psQ0wct/VWv2yP:4f/0hYjqUGPcQOOcvjQWDoZ/p6afZux

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks