General

  • Target

    836620d09d57ef33df172748ba9ecb8a7f250e4e877afd979dc9c5757e1e05b8

  • Size

    359KB

  • Sample

    241108-v481xsyncl

  • MD5

    6af3fd507cc20594c41f93149bed2c02

  • SHA1

    b36c0c2cff3a50fad8fa7d7cbbc949bffdde18b1

  • SHA256

    836620d09d57ef33df172748ba9ecb8a7f250e4e877afd979dc9c5757e1e05b8

  • SHA512

    b477313553d09e8fd90d98e6e031d7ca722fdf67ecd5e4a00722eed8debd7ab1450603b0d0fe5ab8cf07500aeb2bc20d2d108ae54a735949f42b03e873fec660

  • SSDEEP

    6144:I4z7qhDxK1/QBjqgoXpwRIA36tDe79GNAfKpAD1eWk:Iw7qhDI1/aqdwUtDe7SAfKW1eWk

Malware Config

Extracted

Family

redline

Botnet

PUB

C2

45.9.20.20:13441

Targets

    • Target

      836620d09d57ef33df172748ba9ecb8a7f250e4e877afd979dc9c5757e1e05b8

    • Size

      359KB

    • MD5

      6af3fd507cc20594c41f93149bed2c02

    • SHA1

      b36c0c2cff3a50fad8fa7d7cbbc949bffdde18b1

    • SHA256

      836620d09d57ef33df172748ba9ecb8a7f250e4e877afd979dc9c5757e1e05b8

    • SHA512

      b477313553d09e8fd90d98e6e031d7ca722fdf67ecd5e4a00722eed8debd7ab1450603b0d0fe5ab8cf07500aeb2bc20d2d108ae54a735949f42b03e873fec660

    • SSDEEP

      6144:I4z7qhDxK1/QBjqgoXpwRIA36tDe79GNAfKpAD1eWk:Iw7qhDI1/aqdwUtDe7SAfKW1eWk

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks