General

  • Target

    65af30d4b73e59ff1d9f4e4b4d6307018ca3f204029f35ceb8747c9524cc8b42

  • Size

    361KB

  • Sample

    241108-evjrnsxqbn

  • MD5

    133edae3927321531d6603714a6c9ed9

  • SHA1

    1e64f4907638e3a2f7f4e001423f87db6e00ebbf

  • SHA256

    65af30d4b73e59ff1d9f4e4b4d6307018ca3f204029f35ceb8747c9524cc8b42

  • SHA512

    db58b1ea44cd8e0da8dd05d03f7e86de64c6db8f2c926c2b1dfa461c3e387a88e5457696d6dde431335a93f99e1baaedfdd67873961dd58bf88a84113dcf4275

  • SSDEEP

    6144:fBmnBSjo/lFC2EK80SDUVv7M+ka2MRkTcm4:fBmnsjo/ltEqZOhaxR2cm

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.20:13441

Targets

    • Target

      65af30d4b73e59ff1d9f4e4b4d6307018ca3f204029f35ceb8747c9524cc8b42

    • Size

      361KB

    • MD5

      133edae3927321531d6603714a6c9ed9

    • SHA1

      1e64f4907638e3a2f7f4e001423f87db6e00ebbf

    • SHA256

      65af30d4b73e59ff1d9f4e4b4d6307018ca3f204029f35ceb8747c9524cc8b42

    • SHA512

      db58b1ea44cd8e0da8dd05d03f7e86de64c6db8f2c926c2b1dfa461c3e387a88e5457696d6dde431335a93f99e1baaedfdd67873961dd58bf88a84113dcf4275

    • SSDEEP

      6144:fBmnBSjo/lFC2EK80SDUVv7M+ka2MRkTcm4:fBmnsjo/ltEqZOhaxR2cm

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks