General

  • Target

    60f9c3950d3dedef5264b6e2da9ac33d31bcbc94253cbae0197b051cbc3ed4fd.exe

  • Size

    345KB

  • Sample

    240721-j8htrawhjd

  • MD5

    5ab99e1cf1cc05f452419c9fb8cf3a26

  • SHA1

    bf8e7ed6fdb6ed4294b6a0a0c2f2dab3099fba32

  • SHA256

    60f9c3950d3dedef5264b6e2da9ac33d31bcbc94253cbae0197b051cbc3ed4fd

  • SHA512

    640621e202ccd34a5f76d96696891e36fb36ca257f43a35b61e4b4f1191508a7b9da66ccdcf1988e01f3598a85a2cd605c9cfaea259ed8e4d6ad3bd008ad7e38

  • SSDEEP

    6144:idCfpk1OQp8Rcw9bfbSkQ8tFFul+okLc0M/HVhfASXxLK4z6Mf7Y:idApk1DSRFfbpQ8PZE0M/HVhISXxm4zq

Malware Config

Extracted

Family

redline

C2

141.94.188.138:46419

Targets

    • Target

      60f9c3950d3dedef5264b6e2da9ac33d31bcbc94253cbae0197b051cbc3ed4fd.exe

    • Size

      345KB

    • MD5

      5ab99e1cf1cc05f452419c9fb8cf3a26

    • SHA1

      bf8e7ed6fdb6ed4294b6a0a0c2f2dab3099fba32

    • SHA256

      60f9c3950d3dedef5264b6e2da9ac33d31bcbc94253cbae0197b051cbc3ed4fd

    • SHA512

      640621e202ccd34a5f76d96696891e36fb36ca257f43a35b61e4b4f1191508a7b9da66ccdcf1988e01f3598a85a2cd605c9cfaea259ed8e4d6ad3bd008ad7e38

    • SSDEEP

      6144:idCfpk1OQp8Rcw9bfbSkQ8tFFul+okLc0M/HVhfASXxLK4z6Mf7Y:idApk1DSRFfbpQ8PZE0M/HVhISXxm4zq

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks