General

  • Target

    0cc9ea2168d73af92cc671d7df2d350b12c7867763da54edc38875680484c375

  • Size

    358KB

  • Sample

    241109-mm5m6ssjfx

  • MD5

    dd9a29925f2483900498055db65094ee

  • SHA1

    59af44173a3f4574af072df27c63ed9ac06453e8

  • SHA256

    0cc9ea2168d73af92cc671d7df2d350b12c7867763da54edc38875680484c375

  • SHA512

    09b3c2a2042d4c853cc47cdd7ea25b0b6325efc5ad7371a00836a6dec43f910e3e952e16b7d9a310b1ede92677caeb28762bc8f702cad8f3b022b8296062e3a5

  • SSDEEP

    6144:TFJsYIWQJbF3kkk246o5xuK38uER9sUMHbzhI20J:hJsYIWQJb2k+6B6EsUwbz

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.20:13441

Targets

    • Target

      0cc9ea2168d73af92cc671d7df2d350b12c7867763da54edc38875680484c375

    • Size

      358KB

    • MD5

      dd9a29925f2483900498055db65094ee

    • SHA1

      59af44173a3f4574af072df27c63ed9ac06453e8

    • SHA256

      0cc9ea2168d73af92cc671d7df2d350b12c7867763da54edc38875680484c375

    • SHA512

      09b3c2a2042d4c853cc47cdd7ea25b0b6325efc5ad7371a00836a6dec43f910e3e952e16b7d9a310b1ede92677caeb28762bc8f702cad8f3b022b8296062e3a5

    • SSDEEP

      6144:TFJsYIWQJbF3kkk246o5xuK38uER9sUMHbzhI20J:hJsYIWQJb2k+6B6EsUwbz

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks