General

  • Target

    93393c15eba11f1503e43c75a7af1ecf82da779921ca9b3373c60ce24ee918c9

  • Size

    292KB

  • Sample

    241107-d52jssvfkp

  • MD5

    2c8c634cd86024e6c9616eabc46cf7f9

  • SHA1

    adb07a7ff31b2aa0d8612d8674ce9b44b761fd75

  • SHA256

    93393c15eba11f1503e43c75a7af1ecf82da779921ca9b3373c60ce24ee918c9

  • SHA512

    3eecde4e6cbc797a096f12da3d916dd4af06c211233793fd1490bbb5a4b6660ed828ecd91ed5f3dff8bbfa5c25f13e925c0e1f63447b9ed60e8e5cc43967c8cd

  • SSDEEP

    6144:BLT9vLXSf1IF4Yx/z2BHM0Ns8xnkVYRkC3IGbeHnGo/hvSGP:5pTSf1o72Bs0q8xn7V3db4nGAvSG

Malware Config

Extracted

Family

redline

Botnet

10fk

C2

185.45.192.203:80

Targets

    • Target

      93393c15eba11f1503e43c75a7af1ecf82da779921ca9b3373c60ce24ee918c9

    • Size

      292KB

    • MD5

      2c8c634cd86024e6c9616eabc46cf7f9

    • SHA1

      adb07a7ff31b2aa0d8612d8674ce9b44b761fd75

    • SHA256

      93393c15eba11f1503e43c75a7af1ecf82da779921ca9b3373c60ce24ee918c9

    • SHA512

      3eecde4e6cbc797a096f12da3d916dd4af06c211233793fd1490bbb5a4b6660ed828ecd91ed5f3dff8bbfa5c25f13e925c0e1f63447b9ed60e8e5cc43967c8cd

    • SSDEEP

      6144:BLT9vLXSf1IF4Yx/z2BHM0Ns8xnkVYRkC3IGbeHnGo/hvSGP:5pTSf1o72Bs0q8xn7V3db4nGAvSG

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks