General

  • Target

    bbf155ae4e23455fa79e0ddb4a4c5433f4aed4d6521e1b9c2fc25fcef35e4762

  • Size

    408KB

  • Sample

    241109-3q9z3avcqk

  • MD5

    7e0e23aadb58c2b7b938119400ff6340

  • SHA1

    5a61ff5f3693f3209ccbd872f9555a21f3ee75e4

  • SHA256

    bbf155ae4e23455fa79e0ddb4a4c5433f4aed4d6521e1b9c2fc25fcef35e4762

  • SHA512

    a3f528776ada400eb11ddb696ff656b2b1e74a83f9582a29c09b32b781bb2cbdb95b889b89f8456e21d0b1357bb3a8297844037a01c9626d3f10494f704182de

  • SSDEEP

    12288:88oE+wl80dZAS+lFeWq5FVAE8uBCHwv6qvX:8w80EnKy3uwHwy2X

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.182:52236

Attributes
  • auth_value

    a272f3a2850ec3dccdaed97234b7c40e

Targets

    • Target

      bbf155ae4e23455fa79e0ddb4a4c5433f4aed4d6521e1b9c2fc25fcef35e4762

    • Size

      408KB

    • MD5

      7e0e23aadb58c2b7b938119400ff6340

    • SHA1

      5a61ff5f3693f3209ccbd872f9555a21f3ee75e4

    • SHA256

      bbf155ae4e23455fa79e0ddb4a4c5433f4aed4d6521e1b9c2fc25fcef35e4762

    • SHA512

      a3f528776ada400eb11ddb696ff656b2b1e74a83f9582a29c09b32b781bb2cbdb95b889b89f8456e21d0b1357bb3a8297844037a01c9626d3f10494f704182de

    • SSDEEP

      12288:88oE+wl80dZAS+lFeWq5FVAE8uBCHwv6qvX:8w80EnKy3uwHwy2X

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks