General

  • Target

    745fd3953d337151dac281a7cebfbc240b2202f243239723a7482f2faf5884ca

  • Size

    49KB

  • Sample

    241107-twstasyjel

  • MD5

    56ff7b232183239059b7abd9d26c3f1c

  • SHA1

    e5ab3fae8b2a0863af02e11bcb6db177c51637fd

  • SHA256

    745fd3953d337151dac281a7cebfbc240b2202f243239723a7482f2faf5884ca

  • SHA512

    39ec6482e878ed7180402f301ae43f4d197f4818c4994e6ff013c7ff1ee25d1c4eaefe272f79193f02fdf87e57e026072fccca1aef7ea4a9cf9d9deb0be064cb

  • SSDEEP

    1536:EVpoLUygWsc0Y6H7amHWQ0/RjbwDWRGflnx7aK:NiRc0YG7aW+RjbwDWex7aK

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

192.168.247.129:37745

Targets

    • Target

      3026431973056fc89fa7eab69aa1bf0aef6bd0c8a98c4632f9aa63506ae9cd84

    • Size

      161KB

    • MD5

      a62e3bb2d749aa30a89bac5cbd2172e8

    • SHA1

      66973f4ec9e349cf03536123c676981840c2fc7c

    • SHA256

      3026431973056fc89fa7eab69aa1bf0aef6bd0c8a98c4632f9aa63506ae9cd84

    • SHA512

      f3c943b2f179245b929cdac5118a322ba9d09c40575a9f828217be368050658744e020e706c34b30a0ea8486c594b2bb5be2db0a865eeb0f3fba10f900d29ef4

    • SSDEEP

      1536:Zqs8OqJGlbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2K3teulgS6p3AvKo:3HuOYj+zi0ZbYe1g0ujyzdMwgg

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks