General

  • Target

    d8587eb6bd277fbc7d256c67bc4ad3c9cb09a47a23e75d388a7db348264d552e

  • Size

    284KB

  • Sample

    241109-m2gvnawlap

  • MD5

    455c470e44de7a9f8ca84f08fd718eac

  • SHA1

    0fe221ceb67f509097650ea6d15f3a53bc049985

  • SHA256

    d8587eb6bd277fbc7d256c67bc4ad3c9cb09a47a23e75d388a7db348264d552e

  • SHA512

    e2de6be2d7dad6c17c273fd596d0717c411f4e16dce15eeac2c7e4436fad53dc20f897a1c68eadcc01a4994a21f16640f1b927ad678dce5ca9ee00fa553abbf8

  • SSDEEP

    6144:linf0s4oGOLAFprzQF5F/XJ81urcPI1rKuSzC:knf0s4oGOcFpoN/XJZ4I1rmC

Malware Config

Extracted

Family

redline

Botnet

PUB

C2

45.9.20.20:13441

Targets

    • Target

      d8587eb6bd277fbc7d256c67bc4ad3c9cb09a47a23e75d388a7db348264d552e

    • Size

      284KB

    • MD5

      455c470e44de7a9f8ca84f08fd718eac

    • SHA1

      0fe221ceb67f509097650ea6d15f3a53bc049985

    • SHA256

      d8587eb6bd277fbc7d256c67bc4ad3c9cb09a47a23e75d388a7db348264d552e

    • SHA512

      e2de6be2d7dad6c17c273fd596d0717c411f4e16dce15eeac2c7e4436fad53dc20f897a1c68eadcc01a4994a21f16640f1b927ad678dce5ca9ee00fa553abbf8

    • SSDEEP

      6144:linf0s4oGOLAFprzQF5F/XJ81urcPI1rKuSzC:knf0s4oGOcFpoN/XJZ4I1rmC

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks