General

  • Target

    56e0c58b8ea815079fc4609e1b4a908fabb6e160e2c706971b424a92ca80a91d

  • Size

    43KB

  • Sample

    240419-veljbsaf81

  • MD5

    b2128292db0d2ffb986a5beee42d971a

  • SHA1

    67276a2075613f2866e122804c7b947115f287ce

  • SHA256

    56e0c58b8ea815079fc4609e1b4a908fabb6e160e2c706971b424a92ca80a91d

  • SHA512

    96a2591601e6d0092d6c65e3e808172a069f9196c62bcf3258562d35df90bd8b300c43da42e89bc6f1e6a2188dd18870f3f030288ba9e91bf1f5b0f3d2864424

  • SSDEEP

    768:3q2w8ViK0MdbeAoJNkJX0J0x8wA4av4cZHebr6ECCCSwwG09tDUqpg5M2pwq75f:xwIiK92NSX0DwevReP6QsC9+xp175f

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

94.228.162.55:4483

Targets

    • Target

      7047f033fcf8a32d52e47569e8c9768905eb4a588bbfb4582ae31c6ade0f7dda.exe

    • Size

      95KB

    • MD5

      66b2fe6065c9cb69baa4e263a0d19c4b

    • SHA1

      cb1d74c1de469a815a777f26d8150f636c689f52

    • SHA256

      7047f033fcf8a32d52e47569e8c9768905eb4a588bbfb4582ae31c6ade0f7dda

    • SHA512

      1b675dcc354e5f1fcc79245674f32a4f6ec1bf911006c19b60374950b0dd34f126e4122412c17ff581d18032d4beb4b965378d19384824e69b1732094ba8637e

    • SSDEEP

      1536:9qs+XqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed273tmulgS6pY:r0gzWHY3+zi0ZbYe1g0ujyzdTY

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks