General

  • Target

    e15bef29ebfe50cafe2146168249828e7349bac261da551ca9106e6a2dafbc8d

  • Size

    891KB

  • Sample

    241106-nszjsa1rhn

  • MD5

    28b4b21f24c68b92771da276e6745d7f

  • SHA1

    584fd248b279314915efd0691d3bcb5542fa17af

  • SHA256

    e15bef29ebfe50cafe2146168249828e7349bac261da551ca9106e6a2dafbc8d

  • SHA512

    fabae4613703696879013b6811da05fd16032c40a31c9b5a0408f2918057b5d2f8bc9afd80317c361ea16409028576f72181b325fd85afc508a170eab969819f

  • SSDEEP

    24576:budXiBvO+DxOYj2cSzG2SIIX2ZQYnNaxvkfZ0I:bam2+DxOYabm1jYnIxvA0I

Malware Config

Extracted

Family

redline

Botnet

19/08

C2

185.125.217.185:35200

Targets

    • Target

      OneTapV4.exe

    • Size

      1.7MB

    • MD5

      3fcce8b9e2b2659fa46aaaa5e007082d

    • SHA1

      15ea770a663418c0d13d256510e349818275af11

    • SHA256

      da9fab8c0b241f3f2c6553cdb898a76b90d14ed694136a6319d2017e1e5f7d57

    • SHA512

      b3b4377406d7bedc85d62e1a4af0f4b8db6c08a69359e9109d2769ad0027517fc8191f47ff99cd9bf35b8e8fc87435e7e9220bc4ea086051715036e446f8ab91

    • SSDEEP

      24576:p0nGasDahabSu/hqE1QG+Q/edFdka2fffaOL7A5jPWVJJ/WJkxChx4I5W:bDmWpfD45DWvJ3xChxPU

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks