General

  • Target

    36507bd53275572b5b021d0ad85310d6b87a5c0cef76ed3a5f653fe0ff365433

  • Size

    43KB

  • Sample

    240419-v77l9sah55

  • MD5

    4a099d32cb96f16cb3bc7d61daa02511

  • SHA1

    2b854e5a53a7736eead79aa7b50de6995b4d4956

  • SHA256

    36507bd53275572b5b021d0ad85310d6b87a5c0cef76ed3a5f653fe0ff365433

  • SHA512

    2ca1db84105d09b338b81255b865261d5a28c5619dc5030f7f6dede52d9e32b931850852d868dafd8cddc05a200ce6a92cc0883a6defcbf451a195eabb3efc6b

  • SSDEEP

    768:Jbsi0YXaDOTSwDIJJPz6SmaD4PfbMJnjjs9OlhQTDsa3JT7A+GktlgFcvemY8Z:KipaDi2J9z6ADefa49OITQa5T7xtlgFw

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

38.181.15.1:28294

Targets

    • Target

      ef82cf52cbcd8a2539aa6340d008b8eecd80d053cbe7a158226fc5c9555e0cbf.exe

    • Size

      95KB

    • MD5

      4860a69d64c373d0193977c602bd19fb

    • SHA1

      9884d128436321f2f01d6137a47733664eafca29

    • SHA256

      ef82cf52cbcd8a2539aa6340d008b8eecd80d053cbe7a158226fc5c9555e0cbf

    • SHA512

      904d069fc663eb7192101cdd6edc8c0a209869cac455386bbf595b318f88b6fe2fc0d32d5c5c3b6a915ea2e90f696d43cf258db444bf575140c2907b089277c7

    • SSDEEP

      1536:xqskjlqzWlbG6jejoigIr43Ywzi0Zb78ivombfexv0ujXyyed2V3teulgS6pk:fYUeYr+zi0ZbYe1g0ujyzdFk

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks