General

  • Target

    1e0745a30fb7a1be3b58cdc789353312e7afbc836d3c0a5cb9ff66ec87ab7b3c

  • Size

    224KB

  • Sample

    241105-hfcatswkfv

  • MD5

    e038e1bafa1774cd98ef2df566dfd73f

  • SHA1

    37837925dfc4c106b3e3761e97f803921d1952fc

  • SHA256

    1e0745a30fb7a1be3b58cdc789353312e7afbc836d3c0a5cb9ff66ec87ab7b3c

  • SHA512

    2f1c274d3ca9bfa54224e4bf33fecda0bde690dd12dcbb9be273407674bbe1aba986affcc9ef6d422592ecbe2a04cf9eceaf0cb1fd582f818243afe55a721301

  • SSDEEP

    3072:L45NdmNyt958az9SezAwOdlmuYM8th2g2462YBbnJ2GmHmlhBiGb5rrGbdEk5EKQ:L4kNytD83Bdn8b962IL+U/iGtWFn

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.20:13441

Targets

    • Target

      1e0745a30fb7a1be3b58cdc789353312e7afbc836d3c0a5cb9ff66ec87ab7b3c

    • Size

      224KB

    • MD5

      e038e1bafa1774cd98ef2df566dfd73f

    • SHA1

      37837925dfc4c106b3e3761e97f803921d1952fc

    • SHA256

      1e0745a30fb7a1be3b58cdc789353312e7afbc836d3c0a5cb9ff66ec87ab7b3c

    • SHA512

      2f1c274d3ca9bfa54224e4bf33fecda0bde690dd12dcbb9be273407674bbe1aba986affcc9ef6d422592ecbe2a04cf9eceaf0cb1fd582f818243afe55a721301

    • SSDEEP

      3072:L45NdmNyt958az9SezAwOdlmuYM8th2g2462YBbnJ2GmHmlhBiGb5rrGbdEk5EKQ:L4kNytD83Bdn8b962IL+U/iGtWFn

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks