General

  • Target

    7b9f655e252c40c7d4dbc001536f534c254cb6efe16193f36d78114722239980

  • Size

    95KB

  • Sample

    241108-p91nvasglb

  • MD5

    56d90acb239e74eb1c382ebb8331d636

  • SHA1

    7dd686dfa515d83e0e62fa4cbe91b8c1d8b7104e

  • SHA256

    7b9f655e252c40c7d4dbc001536f534c254cb6efe16193f36d78114722239980

  • SHA512

    25a88a4ee917c8fe2f91eb089c2e8248a9e3668fa62533e200cc5bc2290be9be7a0789c601b3ab4453b03c63cdb13f24ce9de04ac35c20788bf10ab230811c17

  • SSDEEP

    1536:Vqsm5qeUlbG6jejoigI843Ywzi0Zb78ivombfexv0ujXyyed2Z3tmulgS6pA:TKlMY8+zi0ZbYe1g0ujyzddA

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

workstation2022.ddns.net:62099

Targets

    • Target

      7b9f655e252c40c7d4dbc001536f534c254cb6efe16193f36d78114722239980

    • Size

      95KB

    • MD5

      56d90acb239e74eb1c382ebb8331d636

    • SHA1

      7dd686dfa515d83e0e62fa4cbe91b8c1d8b7104e

    • SHA256

      7b9f655e252c40c7d4dbc001536f534c254cb6efe16193f36d78114722239980

    • SHA512

      25a88a4ee917c8fe2f91eb089c2e8248a9e3668fa62533e200cc5bc2290be9be7a0789c601b3ab4453b03c63cdb13f24ce9de04ac35c20788bf10ab230811c17

    • SSDEEP

      1536:Vqsm5qeUlbG6jejoigI843Ywzi0Zb78ivombfexv0ujXyyed2Z3tmulgS6pA:TKlMY8+zi0ZbYe1g0ujyzddA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks