General

  • Target

    4e658ab23f0d406644c7deea66f3ac91b24e0855ba18c266071c14084e437dc7

  • Size

    400KB

  • Sample

    241105-lc8fmszakr

  • MD5

    5dc2b0f21c19f479233f4e20f877c8c0

  • SHA1

    f0f81fb247fbeb268ae7937c5a75f7281689ce50

  • SHA256

    4e658ab23f0d406644c7deea66f3ac91b24e0855ba18c266071c14084e437dc7

  • SHA512

    0318b5305e0bb16c2032749381ed74b4822819a1f00afaed551ef4f57c635bf3e6a5c57efa5540b836a2c689ba38d4a7d600dd5969339fa51eae42003f3a41c2

  • SSDEEP

    6144:PibViS9GgZ/yTjWXxKCdR9uFN0s7PMzkAgpNWJZHfcUS29bc4CFIcN:WVBPK/WXn9u/0s7ekAgzWXVS2Yic

Malware Config

Extracted

Family

redline

C2

185.215.113.29:8678

Targets

    • Target

      4e658ab23f0d406644c7deea66f3ac91b24e0855ba18c266071c14084e437dc7

    • Size

      400KB

    • MD5

      5dc2b0f21c19f479233f4e20f877c8c0

    • SHA1

      f0f81fb247fbeb268ae7937c5a75f7281689ce50

    • SHA256

      4e658ab23f0d406644c7deea66f3ac91b24e0855ba18c266071c14084e437dc7

    • SHA512

      0318b5305e0bb16c2032749381ed74b4822819a1f00afaed551ef4f57c635bf3e6a5c57efa5540b836a2c689ba38d4a7d600dd5969339fa51eae42003f3a41c2

    • SSDEEP

      6144:PibViS9GgZ/yTjWXxKCdR9uFN0s7PMzkAgpNWJZHfcUS29bc4CFIcN:WVBPK/WXn9u/0s7ekAgzWXVS2Yic

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks