General

  • Target

    4465e46c968dff477b74062b8360a50c2abae6494e04c1d0f25a725553b070b5

  • Size

    252KB

  • Sample

    241106-serz1ashkm

  • MD5

    07b19b8e9f347b84c93ebfecc0c5b002

  • SHA1

    eb3929a32e86cd9fa81febc14f75dd099bf9420b

  • SHA256

    4465e46c968dff477b74062b8360a50c2abae6494e04c1d0f25a725553b070b5

  • SHA512

    299c65b53159ea9824e178707a7ed07f466a89b395ee1c08ae04d77ccd6e598549d30cfa54bf4f5922e5a0ef7da53c372018992e05c0c285cceaf516932e301e

  • SSDEEP

    3072:VMho8sjFNKp6j+H5LzZ820yQJv3x4x8cO8u+6OzZDN9QarXSCmkMe4ekW75oSYqt:iuC0j+9dQl3xDVkzGckJS

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.20:13441

Targets

    • Target

      4465e46c968dff477b74062b8360a50c2abae6494e04c1d0f25a725553b070b5

    • Size

      252KB

    • MD5

      07b19b8e9f347b84c93ebfecc0c5b002

    • SHA1

      eb3929a32e86cd9fa81febc14f75dd099bf9420b

    • SHA256

      4465e46c968dff477b74062b8360a50c2abae6494e04c1d0f25a725553b070b5

    • SHA512

      299c65b53159ea9824e178707a7ed07f466a89b395ee1c08ae04d77ccd6e598549d30cfa54bf4f5922e5a0ef7da53c372018992e05c0c285cceaf516932e301e

    • SSDEEP

      3072:VMho8sjFNKp6j+H5LzZ820yQJv3x4x8cO8u+6OzZDN9QarXSCmkMe4ekW75oSYqt:iuC0j+9dQl3xDVkzGckJS

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks