General

  • Target

    883ec4bb95a030469fc359522b3d7291dd48f30893a1080b14938b732065783a

  • Size

    389KB

  • Sample

    241108-nh9a8stnhq

  • MD5

    462f67dee5deadb52f13a048749d5756

  • SHA1

    2cb2cb097e4cde81280f12dc355189ef56e87302

  • SHA256

    883ec4bb95a030469fc359522b3d7291dd48f30893a1080b14938b732065783a

  • SHA512

    23bc7f28a16242eee7a2dd0b474705a4381a08d61c1f291222e7df9c3b32b73f93c3167d4e7de306e761808f0642e00098468bfae3b2fbff4546ef5a1e1fff0b

  • SSDEEP

    6144:t3n8E8XvL3Zrh6JfztIf92/4jX8q9aoGaveS/1sb6g06L6MCOhxxFeTr/ekI:ADZrh6Jftm9aoGMJ+7L6+zxF6L

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      883ec4bb95a030469fc359522b3d7291dd48f30893a1080b14938b732065783a

    • Size

      389KB

    • MD5

      462f67dee5deadb52f13a048749d5756

    • SHA1

      2cb2cb097e4cde81280f12dc355189ef56e87302

    • SHA256

      883ec4bb95a030469fc359522b3d7291dd48f30893a1080b14938b732065783a

    • SHA512

      23bc7f28a16242eee7a2dd0b474705a4381a08d61c1f291222e7df9c3b32b73f93c3167d4e7de306e761808f0642e00098468bfae3b2fbff4546ef5a1e1fff0b

    • SSDEEP

      6144:t3n8E8XvL3Zrh6JfztIf92/4jX8q9aoGaveS/1sb6g06L6MCOhxxFeTr/ekI:ADZrh6Jftm9aoGMJ+7L6+zxF6L

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks