General

  • Target

    2bc1d2ec15b9fc3c214b30cd11a01a89c95cbbf91553e057af588867e391d437N

  • Size

    836KB

  • Sample

    241026-q6t8bssqcv

  • MD5

    0bec25c5abf0a00b3efcedbfd4cc66f0

  • SHA1

    15435708a7a40d11ca1b8775a018134b821aabe4

  • SHA256

    2bc1d2ec15b9fc3c214b30cd11a01a89c95cbbf91553e057af588867e391d437

  • SHA512

    0cd8d6e80527630e0a6d63345b92f6c982d664e06f8453f7b0dbe0b86dbf3b3afa3ecbf1fea4b5cfb24ae0413b330a1d5d5519fed11a20e398839799653ed336

  • SSDEEP

    12288:PLkcoxg7v3qnC11ErwIhh0F4qwUgUny5Q4UTQfLho71YLFWFGnUZHQhTWdMkz:TfmMv6Ckr7Mny5Q4UTQfNo7AFZntsz

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

127.0.0.1:55615

Targets

    • Target

      2bc1d2ec15b9fc3c214b30cd11a01a89c95cbbf91553e057af588867e391d437N

    • Size

      836KB

    • MD5

      0bec25c5abf0a00b3efcedbfd4cc66f0

    • SHA1

      15435708a7a40d11ca1b8775a018134b821aabe4

    • SHA256

      2bc1d2ec15b9fc3c214b30cd11a01a89c95cbbf91553e057af588867e391d437

    • SHA512

      0cd8d6e80527630e0a6d63345b92f6c982d664e06f8453f7b0dbe0b86dbf3b3afa3ecbf1fea4b5cfb24ae0413b330a1d5d5519fed11a20e398839799653ed336

    • SSDEEP

      12288:PLkcoxg7v3qnC11ErwIhh0F4qwUgUny5Q4UTQfLho71YLFWFGnUZHQhTWdMkz:TfmMv6Ckr7Mny5Q4UTQfNo7AFZntsz

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks