General

  • Target

    51c1705f90280f8903ae0ac7309be94b353585adf2c3d6afb7f86e3ad530c58b

  • Size

    43KB

  • Sample

    240419-t9pc2aad7t

  • MD5

    ba4797c50947d2c0389ca2d2bde83113

  • SHA1

    ec12fc2dcfc0d10558e8d9003a931b543b2c6f77

  • SHA256

    51c1705f90280f8903ae0ac7309be94b353585adf2c3d6afb7f86e3ad530c58b

  • SHA512

    5ebdb958471577d572edc1dcc0e474bf8d91fdaa2aac0094b61f42d856fb305ecf9c201f39a7e24b434b242f1ab71d63d54a3f175a3c9efd1de23df4b22bfa00

  • SSDEEP

    768:c3hSdjAqbNoVVNmCMd+X5HD3mjhzq39PSy0bIGW8lxbG3F13WOJkNN5:S+jAiojNNM8X5HzahzBBWUxbG3F1/25

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

179.43.191.162:51020

Targets

    • Target

      94ca65bb1bdeb3532dfa526c5ec0b1b6b3adda67dd9860f464d560a5a7339d17.exe

    • Size

      95KB

    • MD5

      4fd67427346755aa9ffded7bcbd0e217

    • SHA1

      038e4d37ff7772e78bf9ea6c2d301faab56ab228

    • SHA256

      94ca65bb1bdeb3532dfa526c5ec0b1b6b3adda67dd9860f464d560a5a7339d17

    • SHA512

      43cc75e3b478e24cc459a04f2a5c3bc2f03bc399ce81368981aa47b7f588226c0b112d786e4a1eb193f012cce6dd8dfb0dea7ffe8c535ec2222fbe7a90464ef0

    • SSDEEP

      1536:5qsCbqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2O3tmulgS6p8l:XEwiYj+zi0ZbYe1g0ujyzdc8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks