General

  • Target

    832dd29f7ffd54f656233e56c588b4fd.bin

  • Size

    53KB

  • Sample

    241018-by6h3a1frl

  • MD5

    2076abe3dbe3dd6bb2df33055881d4c0

  • SHA1

    1a0542b8b5b6530fd09db1b90282e2fd2809a664

  • SHA256

    894387e2f1d21fc6df245127cdf1b8be80a4c6621f65aea92c4d814e3e8495f2

  • SHA512

    2295fe3deaaf2e3492fd72582ac5dea68f541b93b86d2cfc4987ff786b1ac99e7bc1f0c716eda43056a3334afd95601c74f91b8294cb591f3e383943f576bcba

  • SSDEEP

    1536:vYhESotQsmXcPugDHW6l9NdPcIdWQbmDzDq:v6ESo+Xc5HWeN+Mm2

Malware Config

Extracted

Family

redline

Botnet

tony

C2

51.195.145.77:57942

Targets

    • Target

      3868b32b9aeabdd021b9f5d029a741304def18fa3c19a0fe4872e82939aac02d.cmd

    • Size

      75KB

    • MD5

      832dd29f7ffd54f656233e56c588b4fd

    • SHA1

      fd306aaaa8b2065f80773cf440e245f3120eef09

    • SHA256

      3868b32b9aeabdd021b9f5d029a741304def18fa3c19a0fe4872e82939aac02d

    • SHA512

      b5098bc78bb21a8a003b2b5a1c4950ff3a791e9a8543be51c7885b95999a1acef6bdffda9bb92ca2734f8b0f54a1572d9fb3dbdba322abae2d1057273529be10

    • SSDEEP

      1536:udOgvVCMvAg6DhWpHjd62+6LiIB8KUDPGJ/oJzy:wVLAjDhWpjTfuPWIW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

MITRE ATT&CK Enterprise v15

Tasks