General

  • Target

    67b913ed4084eaf4b35aab941c71d9722a367c7b0302a5503b8d3b5647ce0943

  • Size

    362KB

  • Sample

    241108-y4j9cayfne

  • MD5

    6fa15651050d83e9ad37f6be3df72d25

  • SHA1

    d5b56dd27ccbf630301778a11ff620bf38de060c

  • SHA256

    67b913ed4084eaf4b35aab941c71d9722a367c7b0302a5503b8d3b5647ce0943

  • SHA512

    16e8f9eca91314102df24c6d0f5a091bcc22ca25bcbc6522f2359e58bb0af17773cf4c040624ef1c41bfe5a200963b2c82b81b90c6a9a040c8d8a0342dd29075

  • SSDEEP

    6144:77WBzCjYdlhCq4bLW1pVzJZRSnV1520KVEbg1fmlGn:77WBejYdll4OlzhMV156VMgfh

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      67b913ed4084eaf4b35aab941c71d9722a367c7b0302a5503b8d3b5647ce0943

    • Size

      362KB

    • MD5

      6fa15651050d83e9ad37f6be3df72d25

    • SHA1

      d5b56dd27ccbf630301778a11ff620bf38de060c

    • SHA256

      67b913ed4084eaf4b35aab941c71d9722a367c7b0302a5503b8d3b5647ce0943

    • SHA512

      16e8f9eca91314102df24c6d0f5a091bcc22ca25bcbc6522f2359e58bb0af17773cf4c040624ef1c41bfe5a200963b2c82b81b90c6a9a040c8d8a0342dd29075

    • SSDEEP

      6144:77WBzCjYdlhCq4bLW1pVzJZRSnV1520KVEbg1fmlGn:77WBejYdll4OlzhMV156VMgfh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks