General

  • Target

    4c5e787dbe289efd076f6922542d6077670da8bd0ab29c4699f01487c2963ae9

  • Size

    257KB

  • Sample

    241107-bqb99asfjk

  • MD5

    d78de9ff7a942226b5dcb282ac6990d5

  • SHA1

    71dda02b728d1f1be9ba2e98c06ecc85cc24295d

  • SHA256

    4c5e787dbe289efd076f6922542d6077670da8bd0ab29c4699f01487c2963ae9

  • SHA512

    b9b650385e40eb49d2a0f2532a996d3e2ef419c37f938935f42ae3fb3aaf8125469c364f3a1b5fa9e3d2605cec0aff02d97ec6821d8f8ab239a192f0bdc37906

  • SSDEEP

    3072:gLfk8yi0JT1/T0DIfSqsffACB/PPN6fjqklvWwuN5o0b6o:gLgJsIfSqsffxhd6fGkD0h

Malware Config

Extracted

Family

redline

Botnet

crypt

C2

84.246.85.209:55512

Targets

    • Target

      4c5e787dbe289efd076f6922542d6077670da8bd0ab29c4699f01487c2963ae9

    • Size

      257KB

    • MD5

      d78de9ff7a942226b5dcb282ac6990d5

    • SHA1

      71dda02b728d1f1be9ba2e98c06ecc85cc24295d

    • SHA256

      4c5e787dbe289efd076f6922542d6077670da8bd0ab29c4699f01487c2963ae9

    • SHA512

      b9b650385e40eb49d2a0f2532a996d3e2ef419c37f938935f42ae3fb3aaf8125469c364f3a1b5fa9e3d2605cec0aff02d97ec6821d8f8ab239a192f0bdc37906

    • SSDEEP

      3072:gLfk8yi0JT1/T0DIfSqsffACB/PPN6fjqklvWwuN5o0b6o:gLgJsIfSqsffxhd6fGkD0h

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks