General

  • Target

    1bfb966f637bc01d29776b5ec4252e91a06a25320af25c2915e66100398f68e3

  • Size

    318KB

  • Sample

    241107-jm5fma1lfp

  • MD5

    640a491f9e7e2e9688d7bbb73541f883

  • SHA1

    24bdd5dfb7cecedc45f6fa300082b1c364c8b11b

  • SHA256

    1bfb966f637bc01d29776b5ec4252e91a06a25320af25c2915e66100398f68e3

  • SHA512

    ad7fac0e9283e7acf32d56ac5d9da727f86a7ebf10cb76ab41f5f319c1fe22e1a297180d04f7c8da16f56fdfdafd98bcdacaea8e66e15c91baf4bbfc9a156ecb

  • SSDEEP

    6144:vOZQNQQv3nsIrNiUFywfCCjMSGrHebGAVAIJtJBqOVH2oc8:mZIv3nsIrEJwfrrG7TAVAIJzBfVH2z

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      1bfb966f637bc01d29776b5ec4252e91a06a25320af25c2915e66100398f68e3

    • Size

      318KB

    • MD5

      640a491f9e7e2e9688d7bbb73541f883

    • SHA1

      24bdd5dfb7cecedc45f6fa300082b1c364c8b11b

    • SHA256

      1bfb966f637bc01d29776b5ec4252e91a06a25320af25c2915e66100398f68e3

    • SHA512

      ad7fac0e9283e7acf32d56ac5d9da727f86a7ebf10cb76ab41f5f319c1fe22e1a297180d04f7c8da16f56fdfdafd98bcdacaea8e66e15c91baf4bbfc9a156ecb

    • SSDEEP

      6144:vOZQNQQv3nsIrNiUFywfCCjMSGrHebGAVAIJtJBqOVH2oc8:mZIv3nsIrEJwfrrG7TAVAIJzBfVH2z

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks