General

  • Target

    8529635051f73f0bfe0b9b829d2742ca2b5ea30035ba2b72d00a3f6db52c4b98

  • Size

    70KB

  • Sample

    241109-ykceds1cll

  • MD5

    dbf5e383ec262958f0c8bb66683c9027

  • SHA1

    d13ad18b6f4f7478ebf60214eb27a5a80e9aaad4

  • SHA256

    8529635051f73f0bfe0b9b829d2742ca2b5ea30035ba2b72d00a3f6db52c4b98

  • SHA512

    5c1532ce2ce5d8285d202d783303cfa41f81c4f0ebdb4f4505aaee71c6af6360116295db1550eb7fd92a55924096777769f4b33ccfdee364f69b7b88de30c5b0

  • SSDEEP

    1536:nhK2G+EZftJkopjbHA8lLXbkpa+5AcgHmVn6yvcT:nhnaJkopXBLYP9+mVn67T

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.141.215.90:21913

Targets

    • Target

      6a46524a57257a6e245db4de83af275b0905172e2ec03c16c42c68b4fa2cb9b8.exe

    • Size

      76KB

    • MD5

      9d2c7fe5384fdf55fc6424603f9611d8

    • SHA1

      d21366e9e94faaa94ad22cc10511dd0b5800aa8a

    • SHA256

      6a46524a57257a6e245db4de83af275b0905172e2ec03c16c42c68b4fa2cb9b8

    • SHA512

      58fa3c8e9603a4341abe6d6273ab7d4146b8a25ca294e5f19e6be2ef5888f67ca11a82ba31f845b64a71ec5c4e6bbd3eeb29e1b3063f4a7836bac9dcd0c687c8

    • SSDEEP

      1536:cFILxV9Ir2LCpCN8VKvax2H4Ka1ZCDa1G2B1E2:cFILxVou3N8VKvLGG2B1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks