General

  • Target

    767ddad4d95689f9961484bc6f58c6cb

  • Size

    1.1MB

  • Sample

    241110-18vlzsxarb

  • MD5

    767ddad4d95689f9961484bc6f58c6cb

  • SHA1

    b5e256abc33fa4b9d08c401ecec67382db2643ee

  • SHA256

    307667567a5f713026d9ad4ed58da0586382a71243ca0c4f4ce0849102176ed2

  • SHA512

    48eba1ec41a431caf910747427525195a9f8d23b5bbade723c70cf97439614a9a3cc67fe23cbdee573bd5e34021a1bee042e2308b523edbc3e277a538162fb85

  • SSDEEP

    24576:e6C/b7eg0yxpdK6AzvcxyFC83lBdHUkxnhWDdhZ3jcwR:vCTag0yb471Fn3lBdHFPWdvd

Malware Config

Extracted

Family

redline

Botnet

InvasionValorantHackV3.1

C2

45.67.231.218:15411

Targets

    • Target

      8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0

    • Size

      1.2MB

    • MD5

      7561d69fdc62a8a8647f7c33d4413ee4

    • SHA1

      e28b5cbfc7f41e998fab1b1d33b419cfd7f85d64

    • SHA256

      8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0

    • SHA512

      93b4606197a9e76ae73f1eebbc38c0dede308d29f7d8b4228f86546ea59223fe395718fe52059af1299dfa353d9dfb0f456489d8d6c502d70be98b062149f7df

    • SSDEEP

      24576:I1DT7B3uSHk1C5P9ILvWJ3oTJwP85+2HEPR/ekRn1RY5:I1/7BxwC99a03v8+2HEp/1n12

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks