General

  • Target

    365a7a70c96a64365ea347e6b21706169617637adc2331d486550659ce5f98bc

  • Size

    361KB

  • Sample

    241109-jlgceatkdk

  • MD5

    17ca7faa8b39a062d4b322f8b7a754af

  • SHA1

    9ca532a9bd2f9bb8eacc08841069989224678a06

  • SHA256

    365a7a70c96a64365ea347e6b21706169617637adc2331d486550659ce5f98bc

  • SHA512

    ed3a4c9b69a486033a40597e4fc233eb760b37d18fcbb46e0a21e12cf2fe1d439bbe9a25117256ff820eb79c69f8cc486facf1dc346dd11610c42c30b2e3b1a6

  • SSDEEP

    6144:JyTIPyrjmumxQlCb43P1GFmTr1eINlwMVU3GgBvXkZT/5N04:JyTIujmMlP3ebFBeM

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.20:13441

Targets

    • Target

      365a7a70c96a64365ea347e6b21706169617637adc2331d486550659ce5f98bc

    • Size

      361KB

    • MD5

      17ca7faa8b39a062d4b322f8b7a754af

    • SHA1

      9ca532a9bd2f9bb8eacc08841069989224678a06

    • SHA256

      365a7a70c96a64365ea347e6b21706169617637adc2331d486550659ce5f98bc

    • SHA512

      ed3a4c9b69a486033a40597e4fc233eb760b37d18fcbb46e0a21e12cf2fe1d439bbe9a25117256ff820eb79c69f8cc486facf1dc346dd11610c42c30b2e3b1a6

    • SSDEEP

      6144:JyTIPyrjmumxQlCb43P1GFmTr1eINlwMVU3GgBvXkZT/5N04:JyTIujmMlP3ebFBeM

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks