General

  • Target

    62248acb7a097e95ef5b09d37d805b941daca4e9c4776fdf9e192d9565ff073a

  • Size

    358KB

  • Sample

    241109-bessvswpan

  • MD5

    ce3a1ad3f54b8f877181b78194917ee1

  • SHA1

    d63339d295a162bfaa07de17bda216b507132e67

  • SHA256

    62248acb7a097e95ef5b09d37d805b941daca4e9c4776fdf9e192d9565ff073a

  • SHA512

    a3da93a439a7503cec1cebe388e3e3317b743bcacf721c349c60ed022ec40fe814c22d902d89f8a2ee4ea9e00ec95877a7f50c41c4622d851e631f89a96803f4

  • SSDEEP

    6144:BusjITQqb737jWw2J0t+ELnTEJAV8T/CqXXUolOtfyKl1:BusjITQqbvjEaMgTMuvoSrl

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.20:13441

Targets

    • Target

      62248acb7a097e95ef5b09d37d805b941daca4e9c4776fdf9e192d9565ff073a

    • Size

      358KB

    • MD5

      ce3a1ad3f54b8f877181b78194917ee1

    • SHA1

      d63339d295a162bfaa07de17bda216b507132e67

    • SHA256

      62248acb7a097e95ef5b09d37d805b941daca4e9c4776fdf9e192d9565ff073a

    • SHA512

      a3da93a439a7503cec1cebe388e3e3317b743bcacf721c349c60ed022ec40fe814c22d902d89f8a2ee4ea9e00ec95877a7f50c41c4622d851e631f89a96803f4

    • SSDEEP

      6144:BusjITQqb737jWw2J0t+ELnTEJAV8T/CqXXUolOtfyKl1:BusjITQqbvjEaMgTMuvoSrl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks