General

  • Target

    a3482571a7c6688c48c30ea7cbd749b9

  • Size

    296KB

  • Sample

    240225-jzd47sgb3x

  • MD5

    a3482571a7c6688c48c30ea7cbd749b9

  • SHA1

    b044a75823588dd76fe11946aaf6efe03bbd6b1c

  • SHA256

    44c59c2243bb510c4e36bc6660d203ef25b0f979750a009104bbb9245f04be3f

  • SHA512

    83aafcb4091bb42e6a1b7025c7d7ef7ab034d8d9f5f2f9e47facb9b240b183f57a94079754f5bdcfb3c216f8b92852cfe2d233f59bc99e050496466ca558ef2b

  • SSDEEP

    3072:J5DnjR1S+sXoy/ODp7mJxqeOhAzqgXgw24g5/0R3O0BYzeULq/Ec85/hNEArywoy:LPI90mJ86zQR/09pYiULmRK4RwoOL

Malware Config

Extracted

Family

redline

Botnet

test

C2

205.185.119.191:18846

Targets

    • Target

      a3482571a7c6688c48c30ea7cbd749b9

    • Size

      296KB

    • MD5

      a3482571a7c6688c48c30ea7cbd749b9

    • SHA1

      b044a75823588dd76fe11946aaf6efe03bbd6b1c

    • SHA256

      44c59c2243bb510c4e36bc6660d203ef25b0f979750a009104bbb9245f04be3f

    • SHA512

      83aafcb4091bb42e6a1b7025c7d7ef7ab034d8d9f5f2f9e47facb9b240b183f57a94079754f5bdcfb3c216f8b92852cfe2d233f59bc99e050496466ca558ef2b

    • SSDEEP

      3072:J5DnjR1S+sXoy/ODp7mJxqeOhAzqgXgw24g5/0R3O0BYzeULq/Ec85/hNEArywoy:LPI90mJ86zQR/09pYiULmRK4RwoOL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks