General

  • Target

    5051eca47c55cc9f657618edf9240af41c6cdb58f7fcd6cf0629fc8d62bfe0fd

  • Size

    243KB

  • Sample

    241106-p35dfs1cnp

  • MD5

    12024dd8b1859f21a1f19b2132a2e351

  • SHA1

    65539320ec6421558743162dea612718fa15c66e

  • SHA256

    5051eca47c55cc9f657618edf9240af41c6cdb58f7fcd6cf0629fc8d62bfe0fd

  • SHA512

    f445a5d813b4ac431d9172764e41e4e03d54b9f5adc6cc5f2bc72567c6a5de7cc974bac95b8d9c5f240ab1929330e9ab90cd365d197626ed16d423a92bfc3208

  • SSDEEP

    3072:j7ZfniI3YLMVupNKfMDrhGM9LRHtvuyQNIgv9HbR5nkXYQ1J8so5JRz5j:jZVYL3pNb5GMxvupNII7R5nKjqz

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      5051eca47c55cc9f657618edf9240af41c6cdb58f7fcd6cf0629fc8d62bfe0fd

    • Size

      243KB

    • MD5

      12024dd8b1859f21a1f19b2132a2e351

    • SHA1

      65539320ec6421558743162dea612718fa15c66e

    • SHA256

      5051eca47c55cc9f657618edf9240af41c6cdb58f7fcd6cf0629fc8d62bfe0fd

    • SHA512

      f445a5d813b4ac431d9172764e41e4e03d54b9f5adc6cc5f2bc72567c6a5de7cc974bac95b8d9c5f240ab1929330e9ab90cd365d197626ed16d423a92bfc3208

    • SSDEEP

      3072:j7ZfniI3YLMVupNKfMDrhGM9LRHtvuyQNIgv9HbR5nkXYQ1J8so5JRz5j:jZVYL3pNb5GMxvupNII7R5nKjqz

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks