General

  • Target

    ccec4d402470ea5e7f1d7876943c2fab

  • Size

    352KB

  • Sample

    240316-dczjqsac9s

  • MD5

    ccec4d402470ea5e7f1d7876943c2fab

  • SHA1

    38e3ecb95f1875ac7e772e1027af24885a72b29c

  • SHA256

    cac62a925e9aedc73680e8a9ab66c583595d8ddb2dce9275f0ad537557aaeefa

  • SHA512

    c8cc239db5d9170480baac5433e591d449ab683d09ea93df10d085772481136a05f655d32925a68b5f71dad9a47f75b14eca4ce02d5a0d48e559369bb76d31e1

  • SSDEEP

    6144:Th9wpY1m3LlpAwC0vYnDPEw81OTH9lzAR0qpmUmozODxBLqGS53y4jjAe:YpjXvYnDPNQOTdlk9gUZCDxBWy43D

Malware Config

Extracted

Family

redline

Botnet

0308santa

C2

185.92.73.140:80

Targets

    • Target

      ccec4d402470ea5e7f1d7876943c2fab

    • Size

      352KB

    • MD5

      ccec4d402470ea5e7f1d7876943c2fab

    • SHA1

      38e3ecb95f1875ac7e772e1027af24885a72b29c

    • SHA256

      cac62a925e9aedc73680e8a9ab66c583595d8ddb2dce9275f0ad537557aaeefa

    • SHA512

      c8cc239db5d9170480baac5433e591d449ab683d09ea93df10d085772481136a05f655d32925a68b5f71dad9a47f75b14eca4ce02d5a0d48e559369bb76d31e1

    • SSDEEP

      6144:Th9wpY1m3LlpAwC0vYnDPEw81OTH9lzAR0qpmUmozODxBLqGS53y4jjAe:YpjXvYnDPNQOTdlk9gUZCDxBWy43D

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks