General

  • Target

    b4a7d1e6d919ce4767dc0fd37d2594bab3fd07c7630020e6e9dc9ec166947dd2

  • Size

    95KB

  • Sample

    241108-pj9ttssdmn

  • MD5

    a24c8182b414b68c7bb4de20b944d8e1

  • SHA1

    b21cd7fdf48103d6e64a69176cd1edf0554b9b3f

  • SHA256

    b4a7d1e6d919ce4767dc0fd37d2594bab3fd07c7630020e6e9dc9ec166947dd2

  • SHA512

    92b5df941b6c3fbaa119682445fb93834c0102e4d49974630bf046088b0716dbc16def332110399b8df978e66fac8b8d9734a91593871de6d2fd0f465d194afa

  • SSDEEP

    1536:1qswlqWWlbG6jejoigI/43Ywzi0Zb78ivombfexv0ujXyyed2/3teulgS6pg:zgReY/+zi0ZbYe1g0ujyzdzg

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

127.0.0.1:57857

Targets

    • Target

      b4a7d1e6d919ce4767dc0fd37d2594bab3fd07c7630020e6e9dc9ec166947dd2

    • Size

      95KB

    • MD5

      a24c8182b414b68c7bb4de20b944d8e1

    • SHA1

      b21cd7fdf48103d6e64a69176cd1edf0554b9b3f

    • SHA256

      b4a7d1e6d919ce4767dc0fd37d2594bab3fd07c7630020e6e9dc9ec166947dd2

    • SHA512

      92b5df941b6c3fbaa119682445fb93834c0102e4d49974630bf046088b0716dbc16def332110399b8df978e66fac8b8d9734a91593871de6d2fd0f465d194afa

    • SSDEEP

      1536:1qswlqWWlbG6jejoigI/43Ywzi0Zb78ivombfexv0ujXyyed2/3teulgS6pg:zgReY/+zi0ZbYe1g0ujyzdzg

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks