General

  • Target

    347a50f1cf4d2f33d027696cbf094032f03ee0a46a8341a9c0b0bc21c329b21c

  • Size

    293KB

  • Sample

    241105-v99veavgpf

  • MD5

    a1e9f6584f02207650d770bfb233b988

  • SHA1

    faed50df6351776c977b018a40943284409e7af3

  • SHA256

    347a50f1cf4d2f33d027696cbf094032f03ee0a46a8341a9c0b0bc21c329b21c

  • SHA512

    fa6b5595f5a2f2615526ad7456e837d1661f25136a439a6f9546430b17221929a31ad26818681114ac5afc18db1a1d3373370d10a859aa938efe54807878fa19

  • SSDEEP

    6144:ZzvULy82v9aBCNop0w9ByS5maA7Woac/G0xzGXbA190sZz5JHK3tpt:Z432vMBm00Mvq77ac/1zJiZ3tpt

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      347a50f1cf4d2f33d027696cbf094032f03ee0a46a8341a9c0b0bc21c329b21c

    • Size

      293KB

    • MD5

      a1e9f6584f02207650d770bfb233b988

    • SHA1

      faed50df6351776c977b018a40943284409e7af3

    • SHA256

      347a50f1cf4d2f33d027696cbf094032f03ee0a46a8341a9c0b0bc21c329b21c

    • SHA512

      fa6b5595f5a2f2615526ad7456e837d1661f25136a439a6f9546430b17221929a31ad26818681114ac5afc18db1a1d3373370d10a859aa938efe54807878fa19

    • SSDEEP

      6144:ZzvULy82v9aBCNop0w9ByS5maA7Woac/G0xzGXbA190sZz5JHK3tpt:Z432vMBm00Mvq77ac/1zJiZ3tpt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks