General

  • Target

    99413087ffe7340e99989d09040ac13512349706ba56709703733da3dc4f2635

  • Size

    43KB

  • Sample

    240419-wnnwgsbd76

  • MD5

    99cfb7d9ebfc582b59590db14ee4dec5

  • SHA1

    6c909d22f145e14b1a4341cbbcac94b0c12ed5e6

  • SHA256

    99413087ffe7340e99989d09040ac13512349706ba56709703733da3dc4f2635

  • SHA512

    45a79ec0758cd218e03b2ad0c477736c62777e68cb08bfe1a2dcec3f1df0066288e8622b1eb1460f4ac6549ef3e9e95ffe9be89af1c1c2bef7d0eaac79b8c0f1

  • SSDEEP

    768:BazE47AYWTjFxuim+BYoVHHdc4Q64Zs7Yf6HoanvvjcgMYs971tEwjfP3:CE46j7Bimc4QAcO5nwgcIwTP3

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

ae1.localto.net:8080

Targets

    • Target

      861ddbde9e32976e5a35a266c8a6eb8de0ded75940d03a99bb7d8ad5126ad972.exe

    • Size

      95KB

    • MD5

      ba90a65470771d464e5468506f0ef11f

    • SHA1

      2cb30138d0dabdbbaf8a9695f406bdf207262d7f

    • SHA256

      861ddbde9e32976e5a35a266c8a6eb8de0ded75940d03a99bb7d8ad5126ad972

    • SHA512

      36de0b7092563c5b60362fb3dfc83ae0f828ffc008e84b9aa43a4b05eb689347e92f5e3894c42427e3dba14f91915c55806a71c34d1faf0ee05b6c05ce061e53

    • SSDEEP

      1536:5qsCbqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2+3tmulgS6p8l:XEwiYj+zi0ZbYe1g0ujyzd88

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks