General

  • Target

    bec7e89ad1218ea648c8a8b74a0e3ca2

  • Size

    236KB

  • Sample

    240310-q9xsmaeb8s

  • MD5

    bec7e89ad1218ea648c8a8b74a0e3ca2

  • SHA1

    000f57c9f933fa77dc34093440d25d0a68f3aa35

  • SHA256

    fb53c4089e19cca8c8b8602ef0ae9c9614f3428b31cc7db4486a533d84195f84

  • SHA512

    2958afd91a9f4cc4b4cdb2fb2164345f277635db7fcdb04043d650709681bda864822f14a7433fae762fbb4b487bc9afa8deaef1f1db387f88f685c0f8f7f1b5

  • SSDEEP

    6144:5GOqh2ltNbjFjKYrPDlM6PnCyPIucoRP/sU3pJc:5TqhepjK2lfCyPvTsqXc

Malware Config

Extracted

Family

redline

Botnet

@evilnotlive

C2

3.68.106.170:59223

Targets

    • Target

      bec7e89ad1218ea648c8a8b74a0e3ca2

    • Size

      236KB

    • MD5

      bec7e89ad1218ea648c8a8b74a0e3ca2

    • SHA1

      000f57c9f933fa77dc34093440d25d0a68f3aa35

    • SHA256

      fb53c4089e19cca8c8b8602ef0ae9c9614f3428b31cc7db4486a533d84195f84

    • SHA512

      2958afd91a9f4cc4b4cdb2fb2164345f277635db7fcdb04043d650709681bda864822f14a7433fae762fbb4b487bc9afa8deaef1f1db387f88f685c0f8f7f1b5

    • SSDEEP

      6144:5GOqh2ltNbjFjKYrPDlM6PnCyPIucoRP/sU3pJc:5TqhepjK2lfCyPvTsqXc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks