General

  • Target

    260f84f7b0a5d0af5a35124d643a35576cb92fac28a22f9d21f89b8f55d86411

  • Size

    361KB

  • Sample

    241109-sfrqmaxajn

  • MD5

    88b8c7ff3204bca8a6c79a80c70c4b24

  • SHA1

    223e25a9a64072e2f966858fc72d487099601a5c

  • SHA256

    260f84f7b0a5d0af5a35124d643a35576cb92fac28a22f9d21f89b8f55d86411

  • SHA512

    f60910b86f3636b62c88997043249b83d221a663a52d0db8eb3f93a956613f9e95204d77d99e90f849afdf907535f590147b2598740eb0cf0d379a52fc87fb03

  • SSDEEP

    6144:yy+aJYjiVliCG/dns27iO5rW3dzHZ4vWvIxdo:yy+aWjiVlw/Os7pW3dbmO

Malware Config

Extracted

Family

redline

Botnet

PUB

C2

45.9.20.20:13441

Targets

    • Target

      260f84f7b0a5d0af5a35124d643a35576cb92fac28a22f9d21f89b8f55d86411

    • Size

      361KB

    • MD5

      88b8c7ff3204bca8a6c79a80c70c4b24

    • SHA1

      223e25a9a64072e2f966858fc72d487099601a5c

    • SHA256

      260f84f7b0a5d0af5a35124d643a35576cb92fac28a22f9d21f89b8f55d86411

    • SHA512

      f60910b86f3636b62c88997043249b83d221a663a52d0db8eb3f93a956613f9e95204d77d99e90f849afdf907535f590147b2598740eb0cf0d379a52fc87fb03

    • SSDEEP

      6144:yy+aJYjiVliCG/dns27iO5rW3dzHZ4vWvIxdo:yy+aWjiVlw/Os7pW3dbmO

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks