General

  • Target

    3c4b8bc430fc9eb792fcaa972c98decbb9ac1ba3cab3d50f28f4bac7e550fa52

  • Size

    412KB

  • Sample

    241105-wcn24syjcr

  • MD5

    d419db34e5cb504e0b2cb255ea263dd7

  • SHA1

    5db43c922a952200373461abcaad56bcd3f88a50

  • SHA256

    3c4b8bc430fc9eb792fcaa972c98decbb9ac1ba3cab3d50f28f4bac7e550fa52

  • SHA512

    00bc4ae7172d349ce6de3d296a71df12b9de60732a4ca5361f478cd607f70a8d56cdee5f43ef50f156a4d6dbef3199c456614fbf0afb197a30bee6d53b439e9d

  • SSDEEP

    6144:IZB01TjIbpst5ilGizQ6bkmBpNxvw+UbgKr58nAQ/xv5zjn4:AWIbWigic6bkmT3vjULr51Q/xv53

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      3c4b8bc430fc9eb792fcaa972c98decbb9ac1ba3cab3d50f28f4bac7e550fa52

    • Size

      412KB

    • MD5

      d419db34e5cb504e0b2cb255ea263dd7

    • SHA1

      5db43c922a952200373461abcaad56bcd3f88a50

    • SHA256

      3c4b8bc430fc9eb792fcaa972c98decbb9ac1ba3cab3d50f28f4bac7e550fa52

    • SHA512

      00bc4ae7172d349ce6de3d296a71df12b9de60732a4ca5361f478cd607f70a8d56cdee5f43ef50f156a4d6dbef3199c456614fbf0afb197a30bee6d53b439e9d

    • SSDEEP

      6144:IZB01TjIbpst5ilGizQ6bkmBpNxvw+UbgKr58nAQ/xv5zjn4:AWIbWigic6bkmT3vjULr51Q/xv53

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks