General

  • Target

    754e065b32a26f222cfafe84c3c2580e9351b5ae2d993a4167dce12b29f107d6

  • Size

    11.4MB

  • Sample

    241105-ltsrhsyeqc

  • MD5

    afc97b4aa6fe7a077e1347a7f26441d9

  • SHA1

    d48f32f5347f3352ee6ff5f5b56f04df367e20ef

  • SHA256

    754e065b32a26f222cfafe84c3c2580e9351b5ae2d993a4167dce12b29f107d6

  • SHA512

    b869c639f4b8e94c401a4b1182b5f02c474189c6655c52e6d1a8921e77dbdc902255065302dd97cf68133cd68a9197a57daafd5b505974d5169cc947e3a4a8ef

  • SSDEEP

    196608:9BFQPZiE/JLwZy1r/2biR8aNfFXkPKzfAcvnWTEJI/+frxKWGgBxsG+/NOy7q1U:Rq/JLFr/AiRXb/nPI/+zxKWG81OQb1U

Malware Config

Extracted

Family

redline

C2

45.93.4.12:80

Targets

    • Target

      f35fe4b56ef08b2210264aa9f2435c4c6ad4ee01fcd2f65d28ce999e3e6d0cca

    • Size

      11.8MB

    • MD5

      08f8fca339a3ad7f1c56dc76d39cec1b

    • SHA1

      ed98bbfd60127cf3211bbc460ce528a44819f13d

    • SHA256

      f35fe4b56ef08b2210264aa9f2435c4c6ad4ee01fcd2f65d28ce999e3e6d0cca

    • SHA512

      a66a98a8ef45d6f3d7cdb501d7bcf3ee5cdc0b4d213ba3ab8a644838e7f33bf51807bd9ffe60838212ec38aac7f27596038adac0c9320062d349fc9b0ef3844f

    • SSDEEP

      196608:DIDBCySSpV4BDPKeUI8U4e7chj/8v+uhcXRieNYeJ+2pPwsTRfgw6IQSycodVQCv:UDBf3pVGDuI8U4fxZu2XnNJJ+E46Rfkz

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks