General

  • Target

    59601ad66e17a822524e6fa1e911139bc4b2436d040b5981c54ad0296926cbe0

  • Size

    222KB

  • Sample

    241110-3z7lasybkd

  • MD5

    aee5947aeba1b7eff1928fc21ec69777

  • SHA1

    8ac6555a75ec27a2d1840da977ae62fc6f1a8694

  • SHA256

    59601ad66e17a822524e6fa1e911139bc4b2436d040b5981c54ad0296926cbe0

  • SHA512

    afe4f32e574cf6b6086e7ac6d5cede7bef053a3ac4aab95804f5b7399e39990a4283ac0f4839f20191cda0754d6dfa472c1c3e0ec27d1c50cafc75739c4a3b12

  • SSDEEP

    3072:cbqtOpQakuoD9MCaZ7rS5Ljx44kQXG3VDdHRsxp3S4GQmI5ZY/YzaiZ:cbqIpQeMXaZ7W5xPkQ2Fgx+MiYG

Malware Config

Extracted

Family

redline

Botnet

PUB

C2

45.9.20.20:13441

Targets

    • Target

      59601ad66e17a822524e6fa1e911139bc4b2436d040b5981c54ad0296926cbe0

    • Size

      222KB

    • MD5

      aee5947aeba1b7eff1928fc21ec69777

    • SHA1

      8ac6555a75ec27a2d1840da977ae62fc6f1a8694

    • SHA256

      59601ad66e17a822524e6fa1e911139bc4b2436d040b5981c54ad0296926cbe0

    • SHA512

      afe4f32e574cf6b6086e7ac6d5cede7bef053a3ac4aab95804f5b7399e39990a4283ac0f4839f20191cda0754d6dfa472c1c3e0ec27d1c50cafc75739c4a3b12

    • SSDEEP

      3072:cbqtOpQakuoD9MCaZ7rS5Ljx44kQXG3VDdHRsxp3S4GQmI5ZY/YzaiZ:cbqIpQeMXaZ7W5xPkQ2Fgx+MiYG

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks