General

  • Target

    473712c4c1609b277a1c9563086f4bf872f0a6980d77158e7024417d80560aec

  • Size

    284KB

  • Sample

    241106-t9hkgswmfq

  • MD5

    4e961fdb44ab71fa77124826d06f3c9a

  • SHA1

    4e7605973bf4f0777c64382e52260be404b4e4cc

  • SHA256

    473712c4c1609b277a1c9563086f4bf872f0a6980d77158e7024417d80560aec

  • SHA512

    c17dbcfefbead81cc466906b501fd61af24cb2e95db4d3681935bcc352db98bf341ba63185662401b38bb72d8fc8ec33256e874e9a62088263792dd340a13606

  • SSDEEP

    6144:6infu7yI6Sr0nfm0+7Y9fvpqE8jNNGcPI1LVzuSzC:XnfAyI66Ky7YtgpI1LVPC

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.20:13441

Targets

    • Target

      473712c4c1609b277a1c9563086f4bf872f0a6980d77158e7024417d80560aec

    • Size

      284KB

    • MD5

      4e961fdb44ab71fa77124826d06f3c9a

    • SHA1

      4e7605973bf4f0777c64382e52260be404b4e4cc

    • SHA256

      473712c4c1609b277a1c9563086f4bf872f0a6980d77158e7024417d80560aec

    • SHA512

      c17dbcfefbead81cc466906b501fd61af24cb2e95db4d3681935bcc352db98bf341ba63185662401b38bb72d8fc8ec33256e874e9a62088263792dd340a13606

    • SSDEEP

      6144:6infu7yI6Sr0nfm0+7Y9fvpqE8jNNGcPI1LVzuSzC:XnfAyI66Ky7YtgpI1LVPC

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks