General

  • Target

    84689d57efe4e66b1ff58f9e3e199c3d4ab39890d25701c5f6ae669dde632810

  • Size

    43KB

  • Sample

    240419-t983faae2x

  • MD5

    98b1ff55b5c8b7a1f7fc765724085810

  • SHA1

    1d8ab171f3b3e51bb2b69b5bcde1875b61f36fae

  • SHA256

    84689d57efe4e66b1ff58f9e3e199c3d4ab39890d25701c5f6ae669dde632810

  • SHA512

    269af2b3d678b62d09eb15077361813ac9c06c105b64e91330c6e03dbde751ffc074dedbbcc719acf9f85ef9753297ddb78e1d25ea4fdf6e3fab3b97ae5f521d

  • SSDEEP

    768:wJ4T2aMUS6yrtckToIFKXly9Vv/y9F7sNyFkPvZasxCOVUE0xQ3vgOmo:wKc5chXs4sNyFoZasxCjaf2o

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

91.198.77.158:4483

Targets

    • Target

      309d20f7a18a1ae1fed72e5c27b0ef2cc0d52dd1629efc250ca74b916730258f.exe

    • Size

      95KB

    • MD5

      b116641699225bbcea28892995f65115

    • SHA1

      b43f932fa89ba3ca01bbd7739a7e01d0508cfd70

    • SHA256

      309d20f7a18a1ae1fed72e5c27b0ef2cc0d52dd1629efc250ca74b916730258f

    • SHA512

      ac921b0d78f61070903096d31a0cf8d6a80375fbbbb5f1c211bcc8b8d88d982b40cc9088991ddd53b0fe553b0e1bf1f779a2ccae0779c756bea269cd857d79ff

    • SSDEEP

      1536:9qs+XqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2X3tmulgS6pY:r0gzWHY3+zi0ZbYe1g0ujyzdfY

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks