General

  • Target

    19e14e5ffefce00e9a96101005e11ce743f039f102dadc668827ea6a444de691

  • Size

    95KB

  • Sample

    240804-n5kw6avbrk

  • MD5

    18606b5d7c14c855a2911c7bbb835acb

  • SHA1

    6cf6a398986dc0f447bea09ad733c08e52419666

  • SHA256

    19e14e5ffefce00e9a96101005e11ce743f039f102dadc668827ea6a444de691

  • SHA512

    47621fb95716832a20287ff743307ad8b50274482f0844ece2c4c5603345585af93c3732413c6411f4749c8943dcb4fbc4da209c367efa32ee975dff154aaa4d

  • SSDEEP

    1536:9Hqs+Eq76ElbG6jejoigIY43Ywzi0Zb78ivombfexv0ujXyyed2ItmulgS6pM:913+68YY+zi0ZbYe1g0ujyzdkM

Malware Config

Extracted

Family

redline

Botnet

exodusmarket.io

C2

91.92.240.111:1334

Targets

    • Target

      19e14e5ffefce00e9a96101005e11ce743f039f102dadc668827ea6a444de691

    • Size

      95KB

    • MD5

      18606b5d7c14c855a2911c7bbb835acb

    • SHA1

      6cf6a398986dc0f447bea09ad733c08e52419666

    • SHA256

      19e14e5ffefce00e9a96101005e11ce743f039f102dadc668827ea6a444de691

    • SHA512

      47621fb95716832a20287ff743307ad8b50274482f0844ece2c4c5603345585af93c3732413c6411f4749c8943dcb4fbc4da209c367efa32ee975dff154aaa4d

    • SSDEEP

      1536:9Hqs+Eq76ElbG6jejoigIY43Ywzi0Zb78ivombfexv0ujXyyed2ItmulgS6pM:913+68YY+zi0ZbYe1g0ujyzdkM

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix ATT&CK v13

Discovery

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Tasks