General

  • Target

    38334fbea5d2624a2e9d0ea9dc0bfd6400966f6428bced5251f4eab441a37921

  • Size

    412KB

  • Sample

    241105-135vrszbre

  • MD5

    298fc1e185eec19bb06da0887a9d1e7e

  • SHA1

    d9ec01592e1cd940773c8b48b2a368334c45d65c

  • SHA256

    38334fbea5d2624a2e9d0ea9dc0bfd6400966f6428bced5251f4eab441a37921

  • SHA512

    a45f40ac2b7d791ba6d6f7f9ab5f940432faabaeedfc352be0952de3bb19ff79faa1d8549edfcf1f228a14b7ab73f79541f6a213662f2eed2a06cbe3f466ac2e

  • SSDEEP

    6144:O5Y9mbURwawq0Esf/jJo6yhwwmGBkbzTHrUbMwrCw0teBEMv7GmBAA:fmbURwBq0bjJKXmGO/TLUFrQteBEMDr

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      38334fbea5d2624a2e9d0ea9dc0bfd6400966f6428bced5251f4eab441a37921

    • Size

      412KB

    • MD5

      298fc1e185eec19bb06da0887a9d1e7e

    • SHA1

      d9ec01592e1cd940773c8b48b2a368334c45d65c

    • SHA256

      38334fbea5d2624a2e9d0ea9dc0bfd6400966f6428bced5251f4eab441a37921

    • SHA512

      a45f40ac2b7d791ba6d6f7f9ab5f940432faabaeedfc352be0952de3bb19ff79faa1d8549edfcf1f228a14b7ab73f79541f6a213662f2eed2a06cbe3f466ac2e

    • SSDEEP

      6144:O5Y9mbURwawq0Esf/jJo6yhwwmGBkbzTHrUbMwrCw0teBEMv7GmBAA:fmbURwBq0bjJKXmGO/TLUFrQteBEMDr

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks