General

  • Target

    8efeba3bfa893de77d32a5f1ac3cd553b3ccdf7c934ba3258301e119d36958fd

  • Size

    258KB

  • Sample

    241106-3axpsszfma

  • MD5

    d4d51eb5be95ee637bff2fbf62e89dde

  • SHA1

    56d20969973058be6f96416e137ac030b65b95d0

  • SHA256

    8efeba3bfa893de77d32a5f1ac3cd553b3ccdf7c934ba3258301e119d36958fd

  • SHA512

    35e2931c8c2daf0e57978298c08c389cefd12453dd758a0fe81acafe34adc849ee73cdee85b225f067a1c1f1c8315a39a1d4146d4e3ffbcf0b8e7b62bcd46e03

  • SSDEEP

    3072:aa3IM8edbAuESk4pFUyDDSi+/KTk5taJ/Qa1BDfTdTamaIOngi4mM85qQpaN:aarbAus4YRXSTEtaea1Fkmdgg7I8

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      8efeba3bfa893de77d32a5f1ac3cd553b3ccdf7c934ba3258301e119d36958fd

    • Size

      258KB

    • MD5

      d4d51eb5be95ee637bff2fbf62e89dde

    • SHA1

      56d20969973058be6f96416e137ac030b65b95d0

    • SHA256

      8efeba3bfa893de77d32a5f1ac3cd553b3ccdf7c934ba3258301e119d36958fd

    • SHA512

      35e2931c8c2daf0e57978298c08c389cefd12453dd758a0fe81acafe34adc849ee73cdee85b225f067a1c1f1c8315a39a1d4146d4e3ffbcf0b8e7b62bcd46e03

    • SSDEEP

      3072:aa3IM8edbAuESk4pFUyDDSi+/KTk5taJ/Qa1BDfTdTamaIOngi4mM85qQpaN:aarbAus4YRXSTEtaea1Fkmdgg7I8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks