General

  • Target

    3726dca472d7ba8896200b16b9ac787edcb3ae1c1635407423b19a295081d7ee

  • Size

    224KB

  • Sample

    241105-2hjx8s1blq

  • MD5

    1e218d84d0f6c05312255ea624e76598

  • SHA1

    78f61433db3d1a0d5c62f87b2d48c6027639b6fa

  • SHA256

    3726dca472d7ba8896200b16b9ac787edcb3ae1c1635407423b19a295081d7ee

  • SHA512

    8244693bff1823a39d577906b22f89be9aeffcbf7efa2bb39c0a9c3927c0f71f9ecd367b1a06f357c35fc533d06763346fe91ff70850c564ca5de434a1ab824f

  • SSDEEP

    3072:Z6oEEPM7mGO8hydOQ1vKBoQJQX5dqY7p2FT8o5k5bSP0mZZ:Z6opGO8hys2mrC5EE2QN

Malware Config

Extracted

Family

redline

Botnet

PUB

C2

45.9.20.20:13441

Targets

    • Target

      3726dca472d7ba8896200b16b9ac787edcb3ae1c1635407423b19a295081d7ee

    • Size

      224KB

    • MD5

      1e218d84d0f6c05312255ea624e76598

    • SHA1

      78f61433db3d1a0d5c62f87b2d48c6027639b6fa

    • SHA256

      3726dca472d7ba8896200b16b9ac787edcb3ae1c1635407423b19a295081d7ee

    • SHA512

      8244693bff1823a39d577906b22f89be9aeffcbf7efa2bb39c0a9c3927c0f71f9ecd367b1a06f357c35fc533d06763346fe91ff70850c564ca5de434a1ab824f

    • SSDEEP

      3072:Z6oEEPM7mGO8hydOQ1vKBoQJQX5dqY7p2FT8o5k5bSP0mZZ:Z6opGO8hys2mrC5EE2QN

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks