General

  • Target

    eb8a5ab3b07b7253aecfa2058ca7b37b541931fd0d84d0337dc50ee651865909

  • Size

    277KB

  • Sample

    241108-e5z7eavley

  • MD5

    bc0827ed6319bd3f1558f4fc3eacd632

  • SHA1

    ac19cbdf321aea45f8e2659b0b7ccb7785142176

  • SHA256

    eb8a5ab3b07b7253aecfa2058ca7b37b541931fd0d84d0337dc50ee651865909

  • SHA512

    c0c6af6eeb3147670e09482ad91958f0f1549767b2fa1ae4180e92f67a6aa540049827e1f563cbf3d082cdb52c60be951dc380fd39ecee32157c8d615ab78130

  • SSDEEP

    6144:xMLSiTB4Ldi6qy3fjDTjSRl7lIzXGLjSqgMdL:a+iTB4pivyvnf+4zXwjSqv

Malware Config

Extracted

Family

redline

Botnet

PUB

C2

45.9.20.20:13441

Targets

    • Target

      eb8a5ab3b07b7253aecfa2058ca7b37b541931fd0d84d0337dc50ee651865909

    • Size

      277KB

    • MD5

      bc0827ed6319bd3f1558f4fc3eacd632

    • SHA1

      ac19cbdf321aea45f8e2659b0b7ccb7785142176

    • SHA256

      eb8a5ab3b07b7253aecfa2058ca7b37b541931fd0d84d0337dc50ee651865909

    • SHA512

      c0c6af6eeb3147670e09482ad91958f0f1549767b2fa1ae4180e92f67a6aa540049827e1f563cbf3d082cdb52c60be951dc380fd39ecee32157c8d615ab78130

    • SSDEEP

      6144:xMLSiTB4Ldi6qy3fjDTjSRl7lIzXGLjSqgMdL:a+iTB4pivyvnf+4zXwjSqv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks