General

  • Target

    f2ba8f4cafd56b935331d6640557749c87c850e4536715564b2255a9fa161966

  • Size

    156KB

  • Sample

    241108-ldk2qszfpp

  • MD5

    123002053b304078894880cf3e40238c

  • SHA1

    3e75983425d5a1f226137041014ae17457e03d62

  • SHA256

    f2ba8f4cafd56b935331d6640557749c87c850e4536715564b2255a9fa161966

  • SHA512

    bfa04a3f110047e3222e72685aa8e436c93926788d509bd38786d24e2770cb223cb4b6726cd08cd41522a44f2f4b0628bfa24cdd67bc844fdb4a4a96f5ac2905

  • SSDEEP

    3072:1OD6s6zizKhgDx/XT1me8sSoYBzTjiAYxRZ0CEVTk+8rRSC47aA+rF:1G6s6euUQsS/VOA6RbEpk+dC4uA+rF

Malware Config

Extracted

Family

redline

Botnet

VC2408

C2

185.92.73.140:80

Targets

    • Target

      Setup.exe

    • Size

      590KB

    • MD5

      98f610c4cac1c0b5292658886d8bf71a

    • SHA1

      b8343d6c0aabdcff9e476d50efb768446908c779

    • SHA256

      7f9944c359609f2dd20e7cf504c3f49ccc5c0389037edf239bef84963739280e

    • SHA512

      bdeca6786e79c474bd10daf956ef0aedd8271628e062c7cbc8fcd6bd6e88d7c439f20c7c0faf8bd53525422e02c1c9841e2a1609dc1300053ab55f464bfbddf4

    • SSDEEP

      12288:utXGcRC77ZEAWtoCc3Z5Yj0alPaIj9mrxFG:u4/z

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks