General

  • Target

    1a606571e13b2311fc778df70eb579b962c7041a5fd81d8501b3dbd7c5df75d5

  • Size

    286KB

  • Sample

    241106-3tgspasqeq

  • MD5

    3aed3e7cfcc0f3ddb6b80cd2229c247d

  • SHA1

    b0a452837f1c07a5ea22f29d70db927910814fe8

  • SHA256

    1a606571e13b2311fc778df70eb579b962c7041a5fd81d8501b3dbd7c5df75d5

  • SHA512

    f183f79d9a1b8f912a564c8d76d70f86b4877e79ccbf751d666e4438551ff1e1ea66ec7bfb8e94c9e3a58c61621962d56618268b8fc311bab734d52fe71c3cdb

  • SSDEEP

    3072:EJgzCadLt66LtRGNFn3HglrABxTnHVIydyp5g8t6E9LQq/04/qMDW5IaOQsWvTAv:HF9JRin3AlrCH2WE/TET/

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      1a606571e13b2311fc778df70eb579b962c7041a5fd81d8501b3dbd7c5df75d5

    • Size

      286KB

    • MD5

      3aed3e7cfcc0f3ddb6b80cd2229c247d

    • SHA1

      b0a452837f1c07a5ea22f29d70db927910814fe8

    • SHA256

      1a606571e13b2311fc778df70eb579b962c7041a5fd81d8501b3dbd7c5df75d5

    • SHA512

      f183f79d9a1b8f912a564c8d76d70f86b4877e79ccbf751d666e4438551ff1e1ea66ec7bfb8e94c9e3a58c61621962d56618268b8fc311bab734d52fe71c3cdb

    • SSDEEP

      3072:EJgzCadLt66LtRGNFn3HglrABxTnHVIydyp5g8t6E9LQq/04/qMDW5IaOQsWvTAv:HF9JRin3AlrCH2WE/TET/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks