General

  • Target

    c9bc63e8b77037c4faaf0fb5e39689924133d16dedc4dba484b39789462926fe.exe

  • Size

    2.4MB

  • Sample

    240709-x7eycs1dqn

  • MD5

    f4d943387bf5915c1703a7067befb640

  • SHA1

    1c66a240492257e4ee294a2889bf1daf2b44ad01

  • SHA256

    c9bc63e8b77037c4faaf0fb5e39689924133d16dedc4dba484b39789462926fe

  • SHA512

    a9bacbd2066d3f7f48ba8ab71e6cafab0236cbb3e25d50e47df7eb10a81033400b056475d70c2ca332a8efc736ab374fe71682a9eeb4cf41b86d22166b318321

  • SSDEEP

    12288:GB55LGJHP0k6QGixiOM1tuMVFynYjetCnzLAoZ9PpQdH:GdGJHtJLiOM1tZUYZz8on+H

Malware Config

Extracted

Family

redline

Botnet

halle

C2

194.55.186.180:55123

Targets

    • Target

      c9bc63e8b77037c4faaf0fb5e39689924133d16dedc4dba484b39789462926fe.exe

    • Size

      2.4MB

    • MD5

      f4d943387bf5915c1703a7067befb640

    • SHA1

      1c66a240492257e4ee294a2889bf1daf2b44ad01

    • SHA256

      c9bc63e8b77037c4faaf0fb5e39689924133d16dedc4dba484b39789462926fe

    • SHA512

      a9bacbd2066d3f7f48ba8ab71e6cafab0236cbb3e25d50e47df7eb10a81033400b056475d70c2ca332a8efc736ab374fe71682a9eeb4cf41b86d22166b318321

    • SSDEEP

      12288:GB55LGJHP0k6QGixiOM1tuMVFynYjetCnzLAoZ9PpQdH:GdGJHtJLiOM1tZUYZz8on+H

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks