General

  • Target

    5f272f7d5d267070268758daedf8722a3363c3e3fd8bfe3cd80a71979e78248f

  • Size

    420KB

  • Sample

    241104-yqcx4swekg

  • MD5

    49560d64a1d61aab69542640116cdb04

  • SHA1

    dc03b1cc6138cac01bd6a1e72a4e04050fe5c019

  • SHA256

    5f272f7d5d267070268758daedf8722a3363c3e3fd8bfe3cd80a71979e78248f

  • SHA512

    8abd3b0276d4f33b40e033e53789585f8ec8e65d7f97ba60ad5444675c45d4a1db5f178574ae3b5c984a3b9a3dd45f203f00308e77d505e816cebc01c0622a1b

  • SSDEEP

    6144:5tyIPVpSMPCGH4iFhMrWapo3XRqvF3/BTn/JJBz3DCugMucbcLaegv0VuwO4/e9J:pPPPblhMNpggFzJdzBg1paezEw1Yt4FM

Malware Config

Extracted

Family

redline

Botnet

@masyana_LZT

C2

185.82.126.114:31858

Targets

    • Target

      3d71a074cc00be7e430cd12e694bf4188d09c5abf638705de00334a579870455

    • Size

      422KB

    • MD5

      500850acce07397c1058b3cbbf85e821

    • SHA1

      49fdcd1c813e49e4f2db4dfa132cb9f8334b60d3

    • SHA256

      3d71a074cc00be7e430cd12e694bf4188d09c5abf638705de00334a579870455

    • SHA512

      3fa1796cdbee990bb285dc64d5905d8d90fab5310606b22d615395cf90609b9157d201edb883df3c24d6ce346c625d4a72bc96bfe4dcfbd6b771c840db7dd903

    • SSDEEP

      12288:maAKNGaI2KQxLKtC+IgDZMODGxkEtQKSmS3IPGZghtU:3AEG12KQxOUMDZnDvKSj3ImQtU

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks