General

  • Target

    11cb05074a9b867f31239a5571848288ab03de9d3f3fdc44fc8c78b817cc0d75

  • Size

    395KB

  • Sample

    241106-2qzzesymhx

  • MD5

    7d38f69c189b9e6b80925c6ab89a21e9

  • SHA1

    26d2f8ab6408d504d8c84483a6c6f7da51224ff7

  • SHA256

    11cb05074a9b867f31239a5571848288ab03de9d3f3fdc44fc8c78b817cc0d75

  • SHA512

    efa239e9fa98ba9e57d696f123d0dd390b04cc5dd53da311a767ef14d946748c2d552e2c0449ae5939b4f40ee258bd8f85cd237d17b6933420a3ee0e23bb0653

  • SSDEEP

    6144:OwI3iaODKuGiYpwkNwj1dxRNh6kSDOIYCTbi2S54CFWv:y3FOGuGpwkGx1Nh6kPNWnS7Q

Malware Config

Extracted

Family

redline

Botnet

590412

C2

84.246.85.209:55123

Targets

    • Target

      11cb05074a9b867f31239a5571848288ab03de9d3f3fdc44fc8c78b817cc0d75

    • Size

      395KB

    • MD5

      7d38f69c189b9e6b80925c6ab89a21e9

    • SHA1

      26d2f8ab6408d504d8c84483a6c6f7da51224ff7

    • SHA256

      11cb05074a9b867f31239a5571848288ab03de9d3f3fdc44fc8c78b817cc0d75

    • SHA512

      efa239e9fa98ba9e57d696f123d0dd390b04cc5dd53da311a767ef14d946748c2d552e2c0449ae5939b4f40ee258bd8f85cd237d17b6933420a3ee0e23bb0653

    • SSDEEP

      6144:OwI3iaODKuGiYpwkNwj1dxRNh6kSDOIYCTbi2S54CFWv:y3FOGuGpwkGx1Nh6kPNWnS7Q

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks