General

  • Target

    24c35602ea2b646cffbc4320cdc0a51f18bdc69243a810eceeb551bbb91b2c00

  • Size

    402KB

  • Sample

    241106-s651yashkf

  • MD5

    66153f076aab6f981ff1192a39c17a40

  • SHA1

    98d9daac597395a6f94c0f670f75c6c8efc0d9bd

  • SHA256

    24c35602ea2b646cffbc4320cdc0a51f18bdc69243a810eceeb551bbb91b2c00

  • SHA512

    5193caf6b52ad72039d1139dcf2f2ff03a672fa074177e26d01050bff7f3b948d4a5d42e95380a27d91b1e19d0563fc98b99e0b6e258ba670e4ce223b76b8c49

  • SSDEEP

    6144:FR8TnjwLV/9gV783GKOHZ9V2I9nck43QYdQkuyHzwJeho+2ns0V4CFR:AgB9gV78KHZTtcT3Xd3Hzw5nsYD

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      24c35602ea2b646cffbc4320cdc0a51f18bdc69243a810eceeb551bbb91b2c00

    • Size

      402KB

    • MD5

      66153f076aab6f981ff1192a39c17a40

    • SHA1

      98d9daac597395a6f94c0f670f75c6c8efc0d9bd

    • SHA256

      24c35602ea2b646cffbc4320cdc0a51f18bdc69243a810eceeb551bbb91b2c00

    • SHA512

      5193caf6b52ad72039d1139dcf2f2ff03a672fa074177e26d01050bff7f3b948d4a5d42e95380a27d91b1e19d0563fc98b99e0b6e258ba670e4ce223b76b8c49

    • SSDEEP

      6144:FR8TnjwLV/9gV783GKOHZ9V2I9nck43QYdQkuyHzwJeho+2ns0V4CFR:AgB9gV78KHZTtcT3Xd3Hzw5nsYD

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks