General

  • Target

    82ae16ab211f64f43e09f70156358188ad3d12d56e625406a9e352a8041c0a2c

  • Size

    409KB

  • Sample

    241106-vhd9estjbz

  • MD5

    e5201f28838b4438b8e038581633eff7

  • SHA1

    f9f849e3909aa42ed6bcfd4247e8cf83bd46834f

  • SHA256

    82ae16ab211f64f43e09f70156358188ad3d12d56e625406a9e352a8041c0a2c

  • SHA512

    879cfd64c2b68aad0d0bf73bee2abdeb7df63d3616603b221db3ccb0ebc8ee59695dc8e07a50cef52143f8656ae9fe94d6091c7abeab410270c151b4fad3f833

  • SSDEEP

    12288:KiFOv/9C19hL8KH7ISP4PMj+pYUM2dfMYvdDy9:VR19V7H74mUjMYVW

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Attributes
  • auth_value

    a272f3a2850ec3dccdaed97234b7c40e

Targets

    • Target

      82ae16ab211f64f43e09f70156358188ad3d12d56e625406a9e352a8041c0a2c

    • Size

      409KB

    • MD5

      e5201f28838b4438b8e038581633eff7

    • SHA1

      f9f849e3909aa42ed6bcfd4247e8cf83bd46834f

    • SHA256

      82ae16ab211f64f43e09f70156358188ad3d12d56e625406a9e352a8041c0a2c

    • SHA512

      879cfd64c2b68aad0d0bf73bee2abdeb7df63d3616603b221db3ccb0ebc8ee59695dc8e07a50cef52143f8656ae9fe94d6091c7abeab410270c151b4fad3f833

    • SSDEEP

      12288:KiFOv/9C19hL8KH7ISP4PMj+pYUM2dfMYvdDy9:VR19V7H74mUjMYVW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks