General

  • Target

    6847fc3daa7e6b65279d7a26a6ccf3dcbbc07e9e3e7acf8c3a49561e42af6291

  • Size

    241KB

  • Sample

    241108-a1e88azrey

  • MD5

    6b974f5cc21a85091c58d942ef422f76

  • SHA1

    69ec51b421b258458693db37c1bf1a50bae9d05e

  • SHA256

    6847fc3daa7e6b65279d7a26a6ccf3dcbbc07e9e3e7acf8c3a49561e42af6291

  • SHA512

    f2b3bea0b723343fa86ee5dea3d995f3c6ac61dc1378f51311673c74af9e9afe230520470827dcfd21d777c6f8f5d4e2c6a0e403b9206d4c3e584fe4ff6250e4

  • SSDEEP

    6144:8ey79YDGOKKXydzeXGWuWTuUT6RbUIS8TahDZpIh:LVDB7pXtueuUT8QIvTahDZeh

Malware Config

Extracted

Family

redline

Botnet

rule

C2

45.155.165.19:24150

Targets

    • Target

      3354174f028a2682fa83d1b8bce2cf90fa39534f108f9902c2d5ecd644ad8421

    • Size

      267KB

    • MD5

      7fbc60753bc9d1a2777b9b19444b2d83

    • SHA1

      ae48e10b02c5db82ced05089878c94ea37808226

    • SHA256

      3354174f028a2682fa83d1b8bce2cf90fa39534f108f9902c2d5ecd644ad8421

    • SHA512

      d4b301b9ae248a89a4f604de0c98ba288f35f3f5c4c6e44af0ac3c03ec5085c91dd0dbe3a28c3ca9b973636a9093b451da698ea9c1bbe0b9074eed0b71fbfd87

    • SSDEEP

      6144:jzbDBkuri/tJa10Z0rKMGHWsrlQJjDebrOTLAE:z1kwMA4cGH9pQdeWTL9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks