General

  • Target

    5914d5b6f36d66fb9fff80dd06d8af4df5dfa77e49f6e3bdf29b677f4d7d995a

  • Size

    249KB

  • Sample

    241109-z647zaseqb

  • MD5

    62b3a7698843ae77b0f60b34c8c0d9a0

  • SHA1

    09dbe627b2be1eb4e0d61c2cac4b8d4480c1099b

  • SHA256

    5914d5b6f36d66fb9fff80dd06d8af4df5dfa77e49f6e3bdf29b677f4d7d995a

  • SHA512

    dad8902077b2a63f708a24f48dc3c35c0da0c45b80c705585bd9178eca8d745acbdc62f6e984d903795d0d6689038d9d29adcd736fad27395325f3b6843de885

  • SSDEEP

    3072:x66FI4FhLuGdTDPr20yUI7j0S/D3UQfgDARz9Qg5xlS9H6p:x6qI47dNDCCI7QCjYDA7lEa

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      5914d5b6f36d66fb9fff80dd06d8af4df5dfa77e49f6e3bdf29b677f4d7d995a

    • Size

      249KB

    • MD5

      62b3a7698843ae77b0f60b34c8c0d9a0

    • SHA1

      09dbe627b2be1eb4e0d61c2cac4b8d4480c1099b

    • SHA256

      5914d5b6f36d66fb9fff80dd06d8af4df5dfa77e49f6e3bdf29b677f4d7d995a

    • SHA512

      dad8902077b2a63f708a24f48dc3c35c0da0c45b80c705585bd9178eca8d745acbdc62f6e984d903795d0d6689038d9d29adcd736fad27395325f3b6843de885

    • SSDEEP

      3072:x66FI4FhLuGdTDPr20yUI7j0S/D3UQfgDARz9Qg5xlS9H6p:x6qI47dNDCCI7QCjYDA7lEa

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks