General

  • Target

    9adecc8c8b426658fc187237771ae462cc819145e8bf111a4ee0b0983c44c935

  • Size

    351KB

  • Sample

    241104-whltyavdkl

  • MD5

    0df6828aa74782131f341b5fb704cd81

  • SHA1

    120c89aee3f23bc1dfab1548f365fcb0f857b551

  • SHA256

    9adecc8c8b426658fc187237771ae462cc819145e8bf111a4ee0b0983c44c935

  • SHA512

    318746bb7e835ad7df5d07e1397fcef0950a745f58d8aa35bd946126ff2a7f0216de6132c8d33df21d5017cebb94a3a606cf0318cd7abbddf2bec37ef3621186

  • SSDEEP

    6144:UaIgsPIvmVYSTEMt6ZeaeTgey3aB3t84AOX+9doaZFc6sPNvoDB/CgIxAlr:UxcmVTTEMt6ZheT+AVL/6sPNvoDBr

Malware Config

Extracted

Family

redline

Botnet

@chmoeblan1

C2

45.133.217.148:65255

Targets

    • Target

      9adecc8c8b426658fc187237771ae462cc819145e8bf111a4ee0b0983c44c935

    • Size

      351KB

    • MD5

      0df6828aa74782131f341b5fb704cd81

    • SHA1

      120c89aee3f23bc1dfab1548f365fcb0f857b551

    • SHA256

      9adecc8c8b426658fc187237771ae462cc819145e8bf111a4ee0b0983c44c935

    • SHA512

      318746bb7e835ad7df5d07e1397fcef0950a745f58d8aa35bd946126ff2a7f0216de6132c8d33df21d5017cebb94a3a606cf0318cd7abbddf2bec37ef3621186

    • SSDEEP

      6144:UaIgsPIvmVYSTEMt6ZeaeTgey3aB3t84AOX+9doaZFc6sPNvoDB/CgIxAlr:UxcmVTTEMt6ZheT+AVL/6sPNvoDBr

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks