General

  • Target

    b13c7d6b392a723d8acd9d752386c91d2918fc95ae962ec94649bd462ba3f77b

  • Size

    239KB

  • Sample

    241106-src2ls1rcs

  • MD5

    1fd88377fd2ed6862150b8d3b8891de7

  • SHA1

    be72057883b0f318021ee77e17562ec92f0244f5

  • SHA256

    b13c7d6b392a723d8acd9d752386c91d2918fc95ae962ec94649bd462ba3f77b

  • SHA512

    c723144871cc25b08765fe3061307dca9265e2ee2f2e1db93abdaa66f6c8dd765cdba22d7d39d1d174b7885224b64747332a0192989634ba5f1fa7e4de927ddc

  • SSDEEP

    3072:OBPv9kWa1bxX08a7dNfY+DDI9tjk5D3j7eW6Vx5MfFKxOr0O:O12X08anBIvjkxTKW1fFMO

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.20:13441

Targets

    • Target

      b13c7d6b392a723d8acd9d752386c91d2918fc95ae962ec94649bd462ba3f77b

    • Size

      239KB

    • MD5

      1fd88377fd2ed6862150b8d3b8891de7

    • SHA1

      be72057883b0f318021ee77e17562ec92f0244f5

    • SHA256

      b13c7d6b392a723d8acd9d752386c91d2918fc95ae962ec94649bd462ba3f77b

    • SHA512

      c723144871cc25b08765fe3061307dca9265e2ee2f2e1db93abdaa66f6c8dd765cdba22d7d39d1d174b7885224b64747332a0192989634ba5f1fa7e4de927ddc

    • SSDEEP

      3072:OBPv9kWa1bxX08a7dNfY+DDI9tjk5D3j7eW6Vx5MfFKxOr0O:O12X08anBIvjkxTKW1fFMO

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks