General

  • Target

    98ff064207bd4fd872304baea2cd4a5ee74f6f772c19ea402e278fdfedb9578d

  • Size

    257KB

  • Sample

    241109-tx7zlsxgqa

  • MD5

    75f597d4edbe921149fe4ddac719e87f

  • SHA1

    bf5e355ad6c8114d1ff205b94078abde1c0465ea

  • SHA256

    98ff064207bd4fd872304baea2cd4a5ee74f6f772c19ea402e278fdfedb9578d

  • SHA512

    6d2bca5d75dfd135f1dd0085fa65e46afa9982bcc94d76b4257a29736a16115814f40761d3bf6624a981e6f03950a5350bbee5d0018f9d9d39072e80b53635e7

  • SSDEEP

    6144:iltBBd65sYkXrqmolP4e7IqET+TZdYP790roFKQgPoc:StBbRYwrqLAeMqEy872ropgF

Malware Config

Extracted

Family

redline

Botnet

crypt

C2

84.246.85.209:55512

Targets

    • Target

      98ff064207bd4fd872304baea2cd4a5ee74f6f772c19ea402e278fdfedb9578d

    • Size

      257KB

    • MD5

      75f597d4edbe921149fe4ddac719e87f

    • SHA1

      bf5e355ad6c8114d1ff205b94078abde1c0465ea

    • SHA256

      98ff064207bd4fd872304baea2cd4a5ee74f6f772c19ea402e278fdfedb9578d

    • SHA512

      6d2bca5d75dfd135f1dd0085fa65e46afa9982bcc94d76b4257a29736a16115814f40761d3bf6624a981e6f03950a5350bbee5d0018f9d9d39072e80b53635e7

    • SSDEEP

      6144:iltBBd65sYkXrqmolP4e7IqET+TZdYP790roFKQgPoc:StBbRYwrqLAeMqEy872ropgF

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks