General

  • Target

    44c81ed8989027dd8633049666873b5cc87d58006c5e309f3eb91f19ff6809d6

  • Size

    254KB

  • Sample

    240903-l5ec9stekm

  • MD5

    32d173bbfc2ace8adb6306dc20b19c9f

  • SHA1

    1c14444d19e23bd80ec2b8c0b2744e4a7edd86ac

  • SHA256

    44c81ed8989027dd8633049666873b5cc87d58006c5e309f3eb91f19ff6809d6

  • SHA512

    740c5f79d4c9a893c55e4dc4e5e266a0a3097375243f2605e4d27ff7095a9e19b69b4e26d2fd9c4ddd72d971b9a4e0df439936d3753125d4a359da6afc6655ce

  • SSDEEP

    6144:1HfkZkZo1orlPLwNaqhGtX/4GAyicNjrmtzrpjzHP:hf0k8m65gQG9F49zv

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Attributes
  • auth_value

    a272f3a2850ec3dccdaed97234b7c40e

Targets

    • Target

      c7a4ac68b75d2638dd62919fbe149f30edd2b662bc65ca9c8b822c5ffc84125f

    • Size

      417KB

    • MD5

      7c0a4453fcc76ed9a621cbcd35529970

    • SHA1

      7c9e0b1ee45bec9cbb0e56a452efe5afc8156a3d

    • SHA256

      c7a4ac68b75d2638dd62919fbe149f30edd2b662bc65ca9c8b822c5ffc84125f

    • SHA512

      43dc632cf303bf003b8f23282f7ef7254c66140d74801805035c130fc00f4b2c1b65dc309b21b3001c960be59aa565c4dbdcf14e1acd9124baf17e3c1e4171fe

    • SSDEEP

      12288:GTbdZlpw06eyWT4j2rhUA2GGgYHdmXzIgzaeGD:Gv/U0xrhUMG2zIgz

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Enterprise v15

Tasks