General

  • Target

    0ae35ccacd442a15f842d47522659e86dd2b2e3ce188742a9da8384a7229811d

  • Size

    401KB

  • Sample

    241109-m99weasmdz

  • MD5

    baa0ebdcb7b25b4cdaa5f2c6fcab9ae8

  • SHA1

    43cb10f18043de7cc9a79af777c9723f43f45ac3

  • SHA256

    0ae35ccacd442a15f842d47522659e86dd2b2e3ce188742a9da8384a7229811d

  • SHA512

    4ae1aaffd85190ae0fca6e6c09b430ba7936a3239fcb15f9bd16e0e0aa61e961bc190878de1f95556a99b19241f1cc82819104174f1054342ebb352894fc06d4

  • SSDEEP

    6144:IjUei2Ot2QZA2cgMzyNS6hBI3CVZxfuKBJIgeajUHccWWBhBSTyCOwIMXOSS4CF8:bepAPAvgMZ6hqwxkbKEa+cytwIMT8e

Malware Config

Extracted

Family

redline

Botnet

UHD_1111

C2

185.215.113.119:15548

Targets

    • Target

      0ae35ccacd442a15f842d47522659e86dd2b2e3ce188742a9da8384a7229811d

    • Size

      401KB

    • MD5

      baa0ebdcb7b25b4cdaa5f2c6fcab9ae8

    • SHA1

      43cb10f18043de7cc9a79af777c9723f43f45ac3

    • SHA256

      0ae35ccacd442a15f842d47522659e86dd2b2e3ce188742a9da8384a7229811d

    • SHA512

      4ae1aaffd85190ae0fca6e6c09b430ba7936a3239fcb15f9bd16e0e0aa61e961bc190878de1f95556a99b19241f1cc82819104174f1054342ebb352894fc06d4

    • SSDEEP

      6144:IjUei2Ot2QZA2cgMzyNS6hBI3CVZxfuKBJIgeajUHccWWBhBSTyCOwIMXOSS4CF8:bepAPAvgMZ6hqwxkbKEa+cytwIMT8e

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks