General

  • Target

    5ecf0dade29bc4365035554275d07a72b112d0b6bc7487cef6a1c40ed50ea28e.zip

  • Size

    43KB

  • MD5

    fa5af34f56151ce341ac8782429e7501

  • SHA1

    6acc42b1a8d5ddc150ad44bf952ed55fd837c72f

  • SHA256

    c4645840f0dde746aa0c49ae17ff29da423fa6e409a8ecb1eeaaddf6f7c6ebe0

  • SHA512

    0fec00331bea2cd40a332900a76b46c2fa37fbb459bf2912eea96c6bb60d0dd926ad496e722b41762ab06423c18958a947d97db005293faf6ae3a6a897ed93e6

  • SSDEEP

    768:KW0XabBAC8oohQcUdfB6dYfKxD+1K9wgS37bydetOBPmYWuS+iivI:KW0aN8VUdfMaf29wxbydKOdmCSjqI

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

0.tcp.eu.ngrok.io:18950

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5ecf0dade29bc4365035554275d07a72b112d0b6bc7487cef6a1c40ed50ea28e.zip
    .zip

    Password: infected

  • 5ecf0dade29bc4365035554275d07a72b112d0b6bc7487cef6a1c40ed50ea28e.exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections