General

  • Target

    8f971c054cd506d521cd458102d4025f

  • Size

    199KB

  • Sample

    240204-tnbj2sdhd3

  • MD5

    8f971c054cd506d521cd458102d4025f

  • SHA1

    5c938e37701bc4a287343b283938bdcb1c0f27b0

  • SHA256

    935a82b438893da3447df6631f85b494e48c474b410d09199b9a80359506232c

  • SHA512

    50733b0fa5748bc6b0145b1139d56a3af96f5c9aa9b337063f3484ad5e4bb012db1615675ad8c78842eb49ccca475493de90a7a733fe01fe341bd5f818e856d3

  • SSDEEP

    3072:b2HR1GaR3X65QahMBrvvbbk9alOx9IqjSLseQOOtpQWtgX/:b2h65QahMBzvbbtOT9jSLseQNPQWtg

Malware Config

Extracted

Family

redline

Botnet

@kexit99

C2

45.81.227.32:22625

Targets

    • Target

      8f971c054cd506d521cd458102d4025f

    • Size

      199KB

    • MD5

      8f971c054cd506d521cd458102d4025f

    • SHA1

      5c938e37701bc4a287343b283938bdcb1c0f27b0

    • SHA256

      935a82b438893da3447df6631f85b494e48c474b410d09199b9a80359506232c

    • SHA512

      50733b0fa5748bc6b0145b1139d56a3af96f5c9aa9b337063f3484ad5e4bb012db1615675ad8c78842eb49ccca475493de90a7a733fe01fe341bd5f818e856d3

    • SSDEEP

      3072:b2HR1GaR3X65QahMBrvvbbk9alOx9IqjSLseQOOtpQWtgX/:b2h65QahMBzvbbtOT9jSLseQNPQWtg

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks