General

  • Target

    4a74a4f1dd790d1b7c68618879ea19d6cb4dc18a

  • Size

    71KB

  • Sample

    241109-fv871aycll

  • MD5

    3faf19405b4384e8b188ee1dee96fd72

  • SHA1

    4a74a4f1dd790d1b7c68618879ea19d6cb4dc18a

  • SHA256

    37ef73dd7086e6360e570921378453ea4ca4ed05824ecadcabe825c45e893e58

  • SHA512

    066beae587e9c661dc3e7592d87556ab6efb0e9e8830624eabc0a4ea5ef6e8cbe2dd3e678d08f6d9fc9be663f0dc476442fe16d3e9a5c9ba048b15414dc74c1d

  • SSDEEP

    1536:RG19zwKeBcz922LCpCN8VKQxOws2Nh4nGcwz0Vaofg2mFQvvu:izCczUu3N8VKQxpTfzxofg2mFQvvu

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

194.26.192.11:58318

Targets

    • Target

      4a74a4f1dd790d1b7c68618879ea19d6cb4dc18a

    • Size

      71KB

    • MD5

      3faf19405b4384e8b188ee1dee96fd72

    • SHA1

      4a74a4f1dd790d1b7c68618879ea19d6cb4dc18a

    • SHA256

      37ef73dd7086e6360e570921378453ea4ca4ed05824ecadcabe825c45e893e58

    • SHA512

      066beae587e9c661dc3e7592d87556ab6efb0e9e8830624eabc0a4ea5ef6e8cbe2dd3e678d08f6d9fc9be663f0dc476442fe16d3e9a5c9ba048b15414dc74c1d

    • SSDEEP

      1536:RG19zwKeBcz922LCpCN8VKQxOws2Nh4nGcwz0Vaofg2mFQvvu:izCczUu3N8VKQxpTfzxofg2mFQvvu

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks