General

  • Target

    f4fd1fca36e467c689ef7828be233c279e283168cea453211be1b3dbfe08244c

  • Size

    56KB

  • Sample

    240417-r1bdpsdh4t

  • MD5

    e9a1ac9e300a0aabc4dd78e4927c5ba3

  • SHA1

    6fc8a54037910ca967c7447c774f8114225263e3

  • SHA256

    f4fd1fca36e467c689ef7828be233c279e283168cea453211be1b3dbfe08244c

  • SHA512

    0d7a39676d99f1423118d4fc0c8024dfa7429d3f4b7965b33255755e5fcfc5780e96e2552cab517e1d1534546d77c1f80e9be2fe5cd2b4abbe2e35d1d85ce471

  • SSDEEP

    1536:cJFa1E7mhTFvJ9vEXauzHMhZ6vrNVtw8b/ZT711+S9uVx:cJYgmXvJ9sXjyArvBv11+Bx

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

159.223.64.235:4483

Targets

    • Target

      f532ffb50ea02931797c324acc407f9563b519c8454524ec8f955bb248942b8d.exe

    • Size

      201KB

    • MD5

      1d48811644eb4ac06661b85fa5a9bc98

    • SHA1

      7a253aa3950f02731e1b3221b75a61c91152e64c

    • SHA256

      f532ffb50ea02931797c324acc407f9563b519c8454524ec8f955bb248942b8d

    • SHA512

      b3ac41cd00edeea653ef44bf4a13993db26105c34f67d4623ef58df79c43bcdd50a884431e1c2f5c0001e9ce830718409d9fff528c75d6d497f256d81d4d21ed

    • SSDEEP

      1536:JqsINqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2B3teulgS6pxCPHu:nAMOY3+zi0ZbYe1g0ujyzd5x/DHiJv4

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks