General

  • Target

    b19adb8d6fbae22a43421e7a2b85b7c83bea0af0805c6e1d8ad7a62b2315c33f

  • Size

    118KB

  • Sample

    241109-nb5pgatcla

  • MD5

    695674e33ee47c2a4b9f6848993762ed

  • SHA1

    87338ae0e212424503cf8bd0fa625652de62ad1f

  • SHA256

    b19adb8d6fbae22a43421e7a2b85b7c83bea0af0805c6e1d8ad7a62b2315c33f

  • SHA512

    db221d93339d65990c1d0772c74622e6bff7b3319eeaee31db397c50a0ffa3391b487abfcb5ad02375a15ead3b2504f8f63911a18b5a792e3d6c50d4b47119aa

  • SSDEEP

    3072:zRFKQFet3Or5UIvi0xU7my5CvPrKrkuzkqU1yn/D:zRFpoedVX2K+CvPmrlkj1yn7

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

193.47.61.7:42774

Targets

    • Target

      be67c3e96365bc394ccb229a414d3ba726ab7498ae73cea5f89d437d7a5d3662.exe

    • Size

      150KB

    • MD5

      5cd1e02cb68df11380841530977ea517

    • SHA1

      09c9bde608ae8fa12a8c205ed093c0bbdb1c8875

    • SHA256

      be67c3e96365bc394ccb229a414d3ba726ab7498ae73cea5f89d437d7a5d3662

    • SHA512

      23b7be40ae811161613f185c1fef96d46b0a8fe2bde0dea726f9f3603998745309c47777a733266291b70e6fc95ddf0f3352bbd08ae9d8d826ff01abb298a845

    • SSDEEP

      3072:k5RYLtJoWl7zPuRy11dafnxyOAxqT2VfOIwRBklg:UYAWpJTvxqSfODH

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks