General

  • Target

    5c8c4ce7ffff39f1c003c1b734f2325fe6694c6b06063f50d3b694e3a81f51c8

  • Size

    178KB

  • Sample

    241109-es5w5axekm

  • MD5

    f74cabcfccea4e945ae3234ff13bb50a

  • SHA1

    1119a5bf7a57df5f814c8d0e66c62010123fb041

  • SHA256

    5c8c4ce7ffff39f1c003c1b734f2325fe6694c6b06063f50d3b694e3a81f51c8

  • SHA512

    da03f1d5d674c364f5987e5eeb06b3e9e79f0ecab733d5ecea327df740c8c2961c621fb52f1c2c78b55f4032d69eaa06e5bee32f700197c797154b04ac875f48

  • SSDEEP

    3072:7T31hRPIWAYDJpcasU4gk2IJFeuYD2YDrXzdHltqtPsDcj440oYQAq6jbpA2:7TJPDX432yVYDpDnYUcj/0jQ23pD

Malware Config

Extracted

Family

redline

Botnet

@Piffik

C2

185.224.132.232:64354

Targets

    • Target

      7067d56123fd38d9b61b9c7609ef5c9f6cec04b61f1d5683fc9756242361bdf3

    • Size

      586KB

    • MD5

      f5a3f3e026d1bf1fde88dc5441e12fef

    • SHA1

      8f21aff635e32661f89f78fd629377ebd9052975

    • SHA256

      7067d56123fd38d9b61b9c7609ef5c9f6cec04b61f1d5683fc9756242361bdf3

    • SHA512

      c55f1cbad578b614ed4cde698dd280a910f0da90d8004e7472c118701c52c919dbb20f84153225823c9379166547091ddc9a60b05e9d2127edccd1949d13eb3f

    • SSDEEP

      12288:wkZ2zL5eA1GoPRkiQKLqvBIbfVLlbO/47FKGy+8:gT13X

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks