General

  • Target

    e24be67fe227a3e59ec3da932321fb7d92e98e10d4ce21595c38bc58073a5efb

  • Size

    259KB

  • Sample

    241106-rf3mfs1jav

  • MD5

    ce8471e46d5d3343c10e058567ea6fcc

  • SHA1

    b51fef846a3597fdb613ed32ac4fd7809ae96133

  • SHA256

    e24be67fe227a3e59ec3da932321fb7d92e98e10d4ce21595c38bc58073a5efb

  • SHA512

    586a1d640914a2bce4d62fb616cca8374e882c49f880a1a8bcadef6c460d8067e8e53047a6f105a32d99ea22c76da5b83e00db91d0381ad0d503dde7283c6155

  • SSDEEP

    6144:KAIc42YkI8hQXAUzZBsLmJegFqFIwQIMCB7T8LMh3QwRVuuM:fnAkI8iqmJsOwQvCt8L63QwRm

Malware Config

Extracted

Family

redline

Botnet

blazzee

C2

2.58.149.114:64329

Targets

    • Target

      6329380d049a1006574b29113c573e42a68cb017ed28e6d885a7ccd459a691b2.exe

    • Size

      276KB

    • MD5

      4b1e104bea647e2ffc5feeb562e3da55

    • SHA1

      2cadfcdd97ef6504275cc8774963a89bd2873d2d

    • SHA256

      6329380d049a1006574b29113c573e42a68cb017ed28e6d885a7ccd459a691b2

    • SHA512

      fcaeea642368ecd0b4e6b497f764fa9e95b2f2d57d2aa5aded7ec58aea5c178adfb308eaf976b7a6415d49f826c67bea3ea87d17b742eb564328fb350f36b3ec

    • SSDEEP

      6144:lbBmWEkyGSjwHvh23s4tvgLTI8NUKH1YVUF/5kEc:lbBmWERG8wHQ3sGvgLTIGrH2E/KEc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks