General

  • Target

    327f2ebc728a476cf1ed2f67b8a50270f06baacd14603c88ca12f5fdbe653eae

  • Size

    357KB

  • Sample

    241105-zlasmaygkr

  • MD5

    5f0774ed302113d6a227d272d510f913

  • SHA1

    37b14dd26d8410d48432caa6eec22f7bdfa64295

  • SHA256

    327f2ebc728a476cf1ed2f67b8a50270f06baacd14603c88ca12f5fdbe653eae

  • SHA512

    1c66cc9e20ebdb0253e6602f2a8ccb93d82beaf8f1c211ff829cd18b6f119ee8d419c342c18250219142880ae031beade31bff5ac9da90425caa09466c5d5e12

  • SSDEEP

    6144:0sriAlQ+bE3S5SDaSMbCYv5pL/M9YwTX+HXwfAlS1TOhCSVKy:0sriAlQ+b/5S+vZ/iX+HXwfAZCx

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      327f2ebc728a476cf1ed2f67b8a50270f06baacd14603c88ca12f5fdbe653eae

    • Size

      357KB

    • MD5

      5f0774ed302113d6a227d272d510f913

    • SHA1

      37b14dd26d8410d48432caa6eec22f7bdfa64295

    • SHA256

      327f2ebc728a476cf1ed2f67b8a50270f06baacd14603c88ca12f5fdbe653eae

    • SHA512

      1c66cc9e20ebdb0253e6602f2a8ccb93d82beaf8f1c211ff829cd18b6f119ee8d419c342c18250219142880ae031beade31bff5ac9da90425caa09466c5d5e12

    • SSDEEP

      6144:0sriAlQ+bE3S5SDaSMbCYv5pL/M9YwTX+HXwfAlS1TOhCSVKy:0sriAlQ+b/5S+vZ/iX+HXwfAZCx

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks