General

  • Target

    26eb165e1e0878eee483f4ae9244a3476f7fe2ba8fd158733ebc1927961806b8

  • Size

    363KB

  • Sample

    241109-jg8wvszhrj

  • MD5

    14cf02f6cceab172d97a291ed8c8bad5

  • SHA1

    1b2d160930e3923e239d8132e78c53fbe03ce73c

  • SHA256

    26eb165e1e0878eee483f4ae9244a3476f7fe2ba8fd158733ebc1927961806b8

  • SHA512

    117537171bfcd983a47418210a7d19a8425b3726065e7e887a610d71f936d587ac372efc198c6512d72af3ef5ed19ac0f7413685bdf49983f6f8c7e147fb1b7d

  • SSDEEP

    6144:kNw8LvCkrcR994Ot+P8hY/gwqnKm58jrAVGo:qLvxrcR9Nt+P8hY/gwwKm58jrAVB

Malware Config

Extracted

Family

redline

Botnet

@chmoeblan1

C2

185.250.206.82:21330

Targets

    • Target

      26eb165e1e0878eee483f4ae9244a3476f7fe2ba8fd158733ebc1927961806b8

    • Size

      363KB

    • MD5

      14cf02f6cceab172d97a291ed8c8bad5

    • SHA1

      1b2d160930e3923e239d8132e78c53fbe03ce73c

    • SHA256

      26eb165e1e0878eee483f4ae9244a3476f7fe2ba8fd158733ebc1927961806b8

    • SHA512

      117537171bfcd983a47418210a7d19a8425b3726065e7e887a610d71f936d587ac372efc198c6512d72af3ef5ed19ac0f7413685bdf49983f6f8c7e147fb1b7d

    • SSDEEP

      6144:kNw8LvCkrcR994Ot+P8hY/gwqnKm58jrAVGo:qLvxrcR9Nt+P8hY/gwwKm58jrAVB

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks