General

  • Target

    93bacab663269c48bc12e8d1d0e0433c0d5bf38c82336e8d117acd6972d1ae49

  • Size

    395KB

  • Sample

    241107-q9wkkaspby

  • MD5

    ae995017207df0e8bd578a1fe7e5a47b

  • SHA1

    c89cc73941f2df8bb07791a437ff628f3284f4c6

  • SHA256

    93bacab663269c48bc12e8d1d0e0433c0d5bf38c82336e8d117acd6972d1ae49

  • SHA512

    16a1fe4fee95086161ddebff35039e28b175d88d15c8e75cf4f081d1b2e101266c4c9954891a1884dd379afce7714980d95880cb3e3c3270e6a4fd50060df65d

  • SSDEEP

    6144:Au9siA10OHXGWYpocwCNGf9iQJaP+/t5h7oEsTFF7Z4CFL1:Lsf1z3G1ochNw9bdrCFF7bJ

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      93bacab663269c48bc12e8d1d0e0433c0d5bf38c82336e8d117acd6972d1ae49

    • Size

      395KB

    • MD5

      ae995017207df0e8bd578a1fe7e5a47b

    • SHA1

      c89cc73941f2df8bb07791a437ff628f3284f4c6

    • SHA256

      93bacab663269c48bc12e8d1d0e0433c0d5bf38c82336e8d117acd6972d1ae49

    • SHA512

      16a1fe4fee95086161ddebff35039e28b175d88d15c8e75cf4f081d1b2e101266c4c9954891a1884dd379afce7714980d95880cb3e3c3270e6a4fd50060df65d

    • SSDEEP

      6144:Au9siA10OHXGWYpocwCNGf9iQJaP+/t5h7oEsTFF7Z4CFL1:Lsf1z3G1ochNw9bdrCFF7bJ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks