General

  • Target

    59affa9b27fe061c2ff15dcd17ebd3c30a83302592d5cc987cf8ee26aee11573

  • Size

    413KB

  • Sample

    241108-m8lr7atmfr

  • MD5

    c5b815b61ed9edd4e11aa9c59d0259bf

  • SHA1

    2fdfcee28df384fd47cc8ee7d6daa51a08693d4a

  • SHA256

    59affa9b27fe061c2ff15dcd17ebd3c30a83302592d5cc987cf8ee26aee11573

  • SHA512

    d4401c9cc94d9cd0543f5e6690574ca5fd90f95a61b5d6174983148d4e10b1bfd65b5a4837298147364d06b1b69a7817f24839a5cba59d2e50a3c16110a28414

  • SSDEEP

    12288:9JFUZZD0/yLPMQHcEiePJQUqajL7ychkdOQ:9J6e/ybMQHlvPGazy

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      59affa9b27fe061c2ff15dcd17ebd3c30a83302592d5cc987cf8ee26aee11573

    • Size

      413KB

    • MD5

      c5b815b61ed9edd4e11aa9c59d0259bf

    • SHA1

      2fdfcee28df384fd47cc8ee7d6daa51a08693d4a

    • SHA256

      59affa9b27fe061c2ff15dcd17ebd3c30a83302592d5cc987cf8ee26aee11573

    • SHA512

      d4401c9cc94d9cd0543f5e6690574ca5fd90f95a61b5d6174983148d4e10b1bfd65b5a4837298147364d06b1b69a7817f24839a5cba59d2e50a3c16110a28414

    • SSDEEP

      12288:9JFUZZD0/yLPMQHcEiePJQUqajL7ychkdOQ:9J6e/ybMQHlvPGazy

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks