General

  • Target

    62a57f47d82d64b7eb78616b82b04657dcd7882c2c511c18056387d1e5eabae9

  • Size

    406KB

  • Sample

    241108-2fcfdatpak

  • MD5

    626198727d455babaca631e6adef2e30

  • SHA1

    220a070a831964a5bacb6e41dbe4d9ee4125fae7

  • SHA256

    62a57f47d82d64b7eb78616b82b04657dcd7882c2c511c18056387d1e5eabae9

  • SHA512

    9045088f7a63b52a70f037d680b69b6aa67ccd3941654bd2406ce54f7c60075ea99c3d7d254fb5390af8e62c9bfc0fc604e71c94b03de5d490b4498b82d72fe0

  • SSDEEP

    12288:d7cX5V++niGMoVIqXAJ5wsmGioqddiE1uusOSRNM:doXUGbVG5SG7E1uu

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Attributes
  • auth_value

    a272f3a2850ec3dccdaed97234b7c40e

Targets

    • Target

      62a57f47d82d64b7eb78616b82b04657dcd7882c2c511c18056387d1e5eabae9

    • Size

      406KB

    • MD5

      626198727d455babaca631e6adef2e30

    • SHA1

      220a070a831964a5bacb6e41dbe4d9ee4125fae7

    • SHA256

      62a57f47d82d64b7eb78616b82b04657dcd7882c2c511c18056387d1e5eabae9

    • SHA512

      9045088f7a63b52a70f037d680b69b6aa67ccd3941654bd2406ce54f7c60075ea99c3d7d254fb5390af8e62c9bfc0fc604e71c94b03de5d490b4498b82d72fe0

    • SSDEEP

      12288:d7cX5V++niGMoVIqXAJ5wsmGioqddiE1uusOSRNM:doXUGbVG5SG7E1uu

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks