General

  • Target

    3777ddb1886fcdfd11c2e5a6ffa904b1c086c2d1e2d2f8b7f02c019d41387fb9

  • Size

    395KB

  • Sample

    241109-mkveessjdz

  • MD5

    7a07248c3ab056884bcba09bcc8dcba1

  • SHA1

    6dda0a57830554ec275384a46e904df427f007fc

  • SHA256

    3777ddb1886fcdfd11c2e5a6ffa904b1c086c2d1e2d2f8b7f02c019d41387fb9

  • SHA512

    c6709fa06ef55a78005c98893cbc13c3ccc3158e49a07beb9956b61a0f7b2ab2565995d5941312aa52355624a1ed918b972640a7fdc613c58d0cad4fcc97eb84

  • SSDEEP

    6144:4vugiXpcyGjRYpoLbhm2EGSOdSRLe2B3Wy9L4CF:zgMpPGjwoLlmBZFZB3Wy9B

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      3777ddb1886fcdfd11c2e5a6ffa904b1c086c2d1e2d2f8b7f02c019d41387fb9

    • Size

      395KB

    • MD5

      7a07248c3ab056884bcba09bcc8dcba1

    • SHA1

      6dda0a57830554ec275384a46e904df427f007fc

    • SHA256

      3777ddb1886fcdfd11c2e5a6ffa904b1c086c2d1e2d2f8b7f02c019d41387fb9

    • SHA512

      c6709fa06ef55a78005c98893cbc13c3ccc3158e49a07beb9956b61a0f7b2ab2565995d5941312aa52355624a1ed918b972640a7fdc613c58d0cad4fcc97eb84

    • SSDEEP

      6144:4vugiXpcyGjRYpoLbhm2EGSOdSRLe2B3Wy9L4CF:zgMpPGjwoLlmBZFZB3Wy9B

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks