General

  • Target

    fd3314f04e9f4bd91445c920250fbaae5835a14b6f9a77dc1fa62a0f8f4a27ee

  • Size

    380KB

  • Sample

    241108-pd1nzasbrb

  • MD5

    fda971266488c0a097e9afdd4e983c31

  • SHA1

    a9eefd14da604017c71629d014f3da19e3b38423

  • SHA256

    fd3314f04e9f4bd91445c920250fbaae5835a14b6f9a77dc1fa62a0f8f4a27ee

  • SHA512

    fb876134c4e609e479bc5d75c876b36395ae99defe3a1b08587e2854860d8ce241f2d8bccb478b4d345a781728151ba0326ff8d10baa9e130fed7259c097b72d

  • SSDEEP

    6144:4z3a6XXyIUW5gaoPFvlS0rReKnDN/UeLBj0U8X7/az2mFrS/nE:ka6XXyIn5UP60rkoHWrgDFC

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      fd3314f04e9f4bd91445c920250fbaae5835a14b6f9a77dc1fa62a0f8f4a27ee

    • Size

      380KB

    • MD5

      fda971266488c0a097e9afdd4e983c31

    • SHA1

      a9eefd14da604017c71629d014f3da19e3b38423

    • SHA256

      fd3314f04e9f4bd91445c920250fbaae5835a14b6f9a77dc1fa62a0f8f4a27ee

    • SHA512

      fb876134c4e609e479bc5d75c876b36395ae99defe3a1b08587e2854860d8ce241f2d8bccb478b4d345a781728151ba0326ff8d10baa9e130fed7259c097b72d

    • SSDEEP

      6144:4z3a6XXyIUW5gaoPFvlS0rReKnDN/UeLBj0U8X7/az2mFrS/nE:ka6XXyIn5UP60rkoHWrgDFC

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks