General

  • Target

    68fbe60b213b97848d5cf2644d15f1442ff560cc6c5e5cfb18e1b4e4e0f818de

  • Size

    250KB

  • Sample

    241107-f4hreavqgy

  • MD5

    3678a915ca89084e0d6c2724171e8258

  • SHA1

    7eb369cb36e5dfba943b99161e2f2c4448293a1d

  • SHA256

    68fbe60b213b97848d5cf2644d15f1442ff560cc6c5e5cfb18e1b4e4e0f818de

  • SHA512

    9ac70bfd42a89babe23a54e4b2a7683ab1a8f51a204f1ce989cf824b7a2c617bc5a2a8250f7b158d090cb9c4e12088820f24cbcf428a1599000817947e295a6e

  • SSDEEP

    3072:azKyEJFnf4RvtNNBPXAgmPc0ZDVvS7mX1Up3+EXlsIGCm2PdPrl5shhhna:znf4RQcOSmX1UpOEXl6Cm2Pdg

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      68fbe60b213b97848d5cf2644d15f1442ff560cc6c5e5cfb18e1b4e4e0f818de

    • Size

      250KB

    • MD5

      3678a915ca89084e0d6c2724171e8258

    • SHA1

      7eb369cb36e5dfba943b99161e2f2c4448293a1d

    • SHA256

      68fbe60b213b97848d5cf2644d15f1442ff560cc6c5e5cfb18e1b4e4e0f818de

    • SHA512

      9ac70bfd42a89babe23a54e4b2a7683ab1a8f51a204f1ce989cf824b7a2c617bc5a2a8250f7b158d090cb9c4e12088820f24cbcf428a1599000817947e295a6e

    • SSDEEP

      3072:azKyEJFnf4RvtNNBPXAgmPc0ZDVvS7mX1Up3+EXlsIGCm2PdPrl5shhhna:znf4RQcOSmX1UpOEXl6Cm2Pdg

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks