General

  • Target

    30032ef77cada374c3ced7c3d33dbabfd0e2e6effd05ab72e4e7f627f0f3b627

  • Size

    239KB

  • Sample

    241109-t54bdsxkdz

  • MD5

    46da55263515b8706350773c2685afb0

  • SHA1

    de132f83bf626a95042cd4d5048926dc09f1b8e5

  • SHA256

    30032ef77cada374c3ced7c3d33dbabfd0e2e6effd05ab72e4e7f627f0f3b627

  • SHA512

    466ae657594e7f6d6b94880ec8e4fd2e3e773a60ff0871f8649efeb8aa2578e0ec96468f802c844fd9f57f1f3daa0e82e812e3f23182e37fa6f75200d695ff41

  • SSDEEP

    6144:Xhxm/26e22FG2QUdGhUkf2uhlH8wsQQGa9qO:nmuF2l2QP1OZwjBa9

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.20:13441

Targets

    • Target

      30032ef77cada374c3ced7c3d33dbabfd0e2e6effd05ab72e4e7f627f0f3b627

    • Size

      239KB

    • MD5

      46da55263515b8706350773c2685afb0

    • SHA1

      de132f83bf626a95042cd4d5048926dc09f1b8e5

    • SHA256

      30032ef77cada374c3ced7c3d33dbabfd0e2e6effd05ab72e4e7f627f0f3b627

    • SHA512

      466ae657594e7f6d6b94880ec8e4fd2e3e773a60ff0871f8649efeb8aa2578e0ec96468f802c844fd9f57f1f3daa0e82e812e3f23182e37fa6f75200d695ff41

    • SSDEEP

      6144:Xhxm/26e22FG2QUdGhUkf2uhlH8wsQQGa9qO:nmuF2l2QP1OZwjBa9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks