General

  • Target

    df193c263a9e6cfca58ba810bdd19d1d24e31a73c65d2036fc2bae6e9aa8f84c

  • Size

    403KB

  • Sample

    241105-2j1mda1bpn

  • MD5

    a92f2587b361ff921d036ad54ee7a4c5

  • SHA1

    4b299fb7566bccae353d275c35cd51bcf21c4d7e

  • SHA256

    df193c263a9e6cfca58ba810bdd19d1d24e31a73c65d2036fc2bae6e9aa8f84c

  • SHA512

    bfbe898bdea91d585579b26b4e89529ca6ff5948281a7008f9479156a1c450c43aea455a785a6db2b8fdbcbf06e7eccb705644348a42a531e81fe29da4ec0fa5

  • SSDEEP

    6144:prjFiwQRTbqLIJL5aDmKoi8lu2mY/wrQu7cTR5kqJL6gxOOhxxdeTr/ekI:pBUJL5km5o2mnrQI4RXL6g1zxd6L

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.20:13441

Targets

    • Target

      df193c263a9e6cfca58ba810bdd19d1d24e31a73c65d2036fc2bae6e9aa8f84c

    • Size

      403KB

    • MD5

      a92f2587b361ff921d036ad54ee7a4c5

    • SHA1

      4b299fb7566bccae353d275c35cd51bcf21c4d7e

    • SHA256

      df193c263a9e6cfca58ba810bdd19d1d24e31a73c65d2036fc2bae6e9aa8f84c

    • SHA512

      bfbe898bdea91d585579b26b4e89529ca6ff5948281a7008f9479156a1c450c43aea455a785a6db2b8fdbcbf06e7eccb705644348a42a531e81fe29da4ec0fa5

    • SSDEEP

      6144:prjFiwQRTbqLIJL5aDmKoi8lu2mY/wrQu7cTR5kqJL6gxOOhxxdeTr/ekI:pBUJL5km5o2mnrQI4RXL6g1zxd6L

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks