General

  • Target

    7bc735754fa92dba662399c31e0fc5c2a5cabc1542221c502d4cfa4117abf2b0

  • Size

    361KB

  • Sample

    241107-jvx2hsycqa

  • MD5

    73d272541796800f3a6e4d230460214c

  • SHA1

    c0eff6b8604f58f770687a06c4e2598392b56587

  • SHA256

    7bc735754fa92dba662399c31e0fc5c2a5cabc1542221c502d4cfa4117abf2b0

  • SHA512

    9340c6a84bfe7ef093f88f411eb7a1c8325777e0ca4fcc695a1d267036453f7884ac074f48febca2dc4cec07bad3140b4e8eecc2259410aceb8be4475124a99d

  • SSDEEP

    6144:ff+kH0jQ+lmC97/N+OYOVX2KEuSfpvBwRjc16Q9x4A7hm:ff+kUjQ+lf7/YOVXxEumvBAcAIx1h

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.20:13441

Targets

    • Target

      7bc735754fa92dba662399c31e0fc5c2a5cabc1542221c502d4cfa4117abf2b0

    • Size

      361KB

    • MD5

      73d272541796800f3a6e4d230460214c

    • SHA1

      c0eff6b8604f58f770687a06c4e2598392b56587

    • SHA256

      7bc735754fa92dba662399c31e0fc5c2a5cabc1542221c502d4cfa4117abf2b0

    • SHA512

      9340c6a84bfe7ef093f88f411eb7a1c8325777e0ca4fcc695a1d267036453f7884ac074f48febca2dc4cec07bad3140b4e8eecc2259410aceb8be4475124a99d

    • SSDEEP

      6144:ff+kH0jQ+lmC97/N+OYOVX2KEuSfpvBwRjc16Q9x4A7hm:ff+kUjQ+lf7/YOVXxEumvBAcAIx1h

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks