General

  • Target

    0636e4d15a647538a6117545649cbd2161fa1df376b3a54d1cde6f36f2776e76

  • Size

    395KB

  • Sample

    241108-vjzlraware

  • MD5

    652068dcd85268d35ada2ac47689bed4

  • SHA1

    16773d9c98578f5f97197c1c944222adc470b1de

  • SHA256

    0636e4d15a647538a6117545649cbd2161fa1df376b3a54d1cde6f36f2776e76

  • SHA512

    8c514760396e9716e4e8827e6dc4bd80996a9f8c74684014d35bde218e977c18318b93200fa8ea66e63934b81b8839ae80f7d336a640e59094222ad774e069f0

  • SSDEEP

    6144:RqGlin0QcWnB5Ie+KYk+Pr3JIoJyonHRqjfGGj3TUO+kapBVfGlM4CF:Xl/QLnBf+Kb+dJTxqbGg3TlK

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      0636e4d15a647538a6117545649cbd2161fa1df376b3a54d1cde6f36f2776e76

    • Size

      395KB

    • MD5

      652068dcd85268d35ada2ac47689bed4

    • SHA1

      16773d9c98578f5f97197c1c944222adc470b1de

    • SHA256

      0636e4d15a647538a6117545649cbd2161fa1df376b3a54d1cde6f36f2776e76

    • SHA512

      8c514760396e9716e4e8827e6dc4bd80996a9f8c74684014d35bde218e977c18318b93200fa8ea66e63934b81b8839ae80f7d336a640e59094222ad774e069f0

    • SSDEEP

      6144:RqGlin0QcWnB5Ie+KYk+Pr3JIoJyonHRqjfGGj3TUO+kapBVfGlM4CF:Xl/QLnBf+Kb+dJTxqbGg3TlK

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks