General

  • Target

    ed716a591137284c6fbd1e917454c775ee457a24f6254558a6fede331fca391c

  • Size

    359KB

  • Sample

    241107-hcza7axelf

  • MD5

    b0224288d78dbbb65af76c16e67ccaa6

  • SHA1

    07f49cbffefb574cd60a96763c09e0781d846b1f

  • SHA256

    ed716a591137284c6fbd1e917454c775ee457a24f6254558a6fede331fca391c

  • SHA512

    5185af03bdf0f54f83155857ed7e078aeddda8845a9f2df03c41c47f6a5608d5ce27b6b2ea1c5ba7131de3e90e0f1e9b11027ad7a091aead4cdd4f6e4f1fd469

  • SSDEEP

    6144:qfrsLD//1/pB8TLR+i2l8kkL0pNiytIPEzeh72kHN3:qfrsLD31/IT52X1Lij8zwSkt

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.20:13441

Targets

    • Target

      ed716a591137284c6fbd1e917454c775ee457a24f6254558a6fede331fca391c

    • Size

      359KB

    • MD5

      b0224288d78dbbb65af76c16e67ccaa6

    • SHA1

      07f49cbffefb574cd60a96763c09e0781d846b1f

    • SHA256

      ed716a591137284c6fbd1e917454c775ee457a24f6254558a6fede331fca391c

    • SHA512

      5185af03bdf0f54f83155857ed7e078aeddda8845a9f2df03c41c47f6a5608d5ce27b6b2ea1c5ba7131de3e90e0f1e9b11027ad7a091aead4cdd4f6e4f1fd469

    • SSDEEP

      6144:qfrsLD//1/pB8TLR+i2l8kkL0pNiytIPEzeh72kHN3:qfrsLD31/IT52X1Lij8zwSkt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks