General

  • Target

    8c21e79aa0eb821f85ee30bdac820933c1030045fd57d91c854995f9242a9837

  • Size

    413KB

  • Sample

    241106-pdg7maypg1

  • MD5

    f7de28d6f08a8fe24de3156c703b9b9f

  • SHA1

    6216eee3cdb9794254b440e90690f2acd3642a51

  • SHA256

    8c21e79aa0eb821f85ee30bdac820933c1030045fd57d91c854995f9242a9837

  • SHA512

    e9626eefd60a2e6ae6649f3cb60ef83106c999ae339c63a9bfade209d9c260aae0879b6c6a79fb9ac8a0d4f260bd32ec682dee9d4eafaa57a77aa97fe892796a

  • SSDEEP

    6144:G0BFPdpYg9dnPHVWq5yUrHJU2rCn//H5UzhbrK+eCGtC0RZSs3:3JpYgnnf5yUrG2u//ZUZrACGtC03

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      8c21e79aa0eb821f85ee30bdac820933c1030045fd57d91c854995f9242a9837

    • Size

      413KB

    • MD5

      f7de28d6f08a8fe24de3156c703b9b9f

    • SHA1

      6216eee3cdb9794254b440e90690f2acd3642a51

    • SHA256

      8c21e79aa0eb821f85ee30bdac820933c1030045fd57d91c854995f9242a9837

    • SHA512

      e9626eefd60a2e6ae6649f3cb60ef83106c999ae339c63a9bfade209d9c260aae0879b6c6a79fb9ac8a0d4f260bd32ec682dee9d4eafaa57a77aa97fe892796a

    • SSDEEP

      6144:G0BFPdpYg9dnPHVWq5yUrHJU2rCn//H5UzhbrK+eCGtC0RZSs3:3JpYgnnf5yUrG2u//ZUZrACGtC03

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks