General

  • Target

    e9512d526c29e1ea3f32196325f594a19e6a5678315e93fb87944ae80e810bfd.exe

  • Size

    95KB

  • Sample

    241016-gf6n1azdmr

  • MD5

    6f0c905bea9a33783f45ad1ac9435290

  • SHA1

    abfbe85fc3aa65183a1103716508d4fb14b4db4d

  • SHA256

    e9512d526c29e1ea3f32196325f594a19e6a5678315e93fb87944ae80e810bfd

  • SHA512

    23cd5ac35e44016fc6f55539af654b3e3ee18aac037c707f8c3a3f57aff932497142a515159102307db0d5ef6af0681b1c9309dfe32846ea604d04485bb0567e

  • SSDEEP

    1536:1qsNfq+TmlbG6jejoigI/43Ywzi0Zb78ivombfexv0ujXyyed2ztmulgS6pg:z9taY/+zi0ZbYe1g0ujyzdTg

Malware Config

Extracted

Family

redline

Botnet

1

C2

5.tcp.ngrok.io:22240

Targets

    • Target

      e9512d526c29e1ea3f32196325f594a19e6a5678315e93fb87944ae80e810bfd.exe

    • Size

      95KB

    • MD5

      6f0c905bea9a33783f45ad1ac9435290

    • SHA1

      abfbe85fc3aa65183a1103716508d4fb14b4db4d

    • SHA256

      e9512d526c29e1ea3f32196325f594a19e6a5678315e93fb87944ae80e810bfd

    • SHA512

      23cd5ac35e44016fc6f55539af654b3e3ee18aac037c707f8c3a3f57aff932497142a515159102307db0d5ef6af0681b1c9309dfe32846ea604d04485bb0567e

    • SSDEEP

      1536:1qsNfq+TmlbG6jejoigI/43Ywzi0Zb78ivombfexv0ujXyyed2ztmulgS6pg:z9taY/+zi0ZbYe1g0ujyzdTg

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks