General

  • Target

    fc8e6480790eda532bdc773d1a8c0a6eadc4adb3aff182c071bbbb70ee9c23b7

  • Size

    274KB

  • Sample

    240902-g5mx7averh

  • MD5

    74fd76549d32bc5efbc5698e609e955a

  • SHA1

    d38fecc605b73192c4096960b628d3afdfcccfb4

  • SHA256

    fc8e6480790eda532bdc773d1a8c0a6eadc4adb3aff182c071bbbb70ee9c23b7

  • SHA512

    88ccea0429ae5dce5d8828801fe13eaf3329481ff04850f306f6e53e86394bcc5526dff6954f613d324cc542cd186c8cb75dab814ebb0fa059971603d930151a

  • SSDEEP

    6144:rJpsQbvSuBcquaGatP8B/931C/6B21dDrLZJN5wgyH:VpszSC1F1zg95RG

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Attributes
  • auth_value

    a272f3a2850ec3dccdaed97234b7c40e

Targets

    • Target

      84b71906fcba6abc50b33eb1621c1ff39ff52b7bb94f23f4132a640768b33811

    • Size

      366KB

    • MD5

      9a8bf71a5dae1350339c724573579747

    • SHA1

      f4819e27576332a1de306823cde8e6b7f7239ecf

    • SHA256

      84b71906fcba6abc50b33eb1621c1ff39ff52b7bb94f23f4132a640768b33811

    • SHA512

      cd32008c87a043c6ad3ac134c4e4e08767be881fe0876034f16cd1574382b2c1d9401add677d3fd9c7700a7b27f22bd4f60afca7c66183458c1b5d091680c15d

    • SSDEEP

      6144:hl6nDkKdBuZWJmlzhxNQzYt0N1bVColFqX7tNfVXVHQLIiu8cfo0/pWm:hliDkkZJC7l0N1QewZGEX8cA0/Mm

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Enterprise v15

Tasks