General

  • Target

    61a6cbf52782a5aadb7e37c19f833fc60501f1a63e92a65545fc3a1094069963

  • Size

    346KB

  • Sample

    241107-djqkeawnhk

  • MD5

    fb647a5b4523ce8ac58c52e6f138033c

  • SHA1

    495a5ffbd7f06cf90589ddd6837745449145f925

  • SHA256

    61a6cbf52782a5aadb7e37c19f833fc60501f1a63e92a65545fc3a1094069963

  • SHA512

    517fba5b99d730eb38c1eb298c268c6710e136f963c547a502183bb9121586ce37ca551f991a5b8236f2f1f0712bb185195f0e2e734296a72e302ddab5d4ff47

  • SSDEEP

    6144:syddeOk2fnp0LCe1gCfDE+uvVW/Sqb8laFoahEk20MnOpWyMUC:7Pk2fnp0LrvfxoU/SXWfmgA

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.20:13441

Targets

    • Target

      61a6cbf52782a5aadb7e37c19f833fc60501f1a63e92a65545fc3a1094069963

    • Size

      346KB

    • MD5

      fb647a5b4523ce8ac58c52e6f138033c

    • SHA1

      495a5ffbd7f06cf90589ddd6837745449145f925

    • SHA256

      61a6cbf52782a5aadb7e37c19f833fc60501f1a63e92a65545fc3a1094069963

    • SHA512

      517fba5b99d730eb38c1eb298c268c6710e136f963c547a502183bb9121586ce37ca551f991a5b8236f2f1f0712bb185195f0e2e734296a72e302ddab5d4ff47

    • SSDEEP

      6144:syddeOk2fnp0LCe1gCfDE+uvVW/Sqb8laFoahEk20MnOpWyMUC:7Pk2fnp0LrvfxoU/SXWfmgA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks