General

  • Target

    5cf8a907326056ddf6e900a177834441a646aff15a191466ec70a8aab7672fed

  • Size

    581KB

  • Sample

    241110-c8ezjaxgjp

  • MD5

    c473aae9581771d04ac0c67b92ddfbb7

  • SHA1

    4644ece22673361405ca9fddbbdcc930abae9197

  • SHA256

    5cf8a907326056ddf6e900a177834441a646aff15a191466ec70a8aab7672fed

  • SHA512

    da562af876c113f967c1d50a6d0f4dbb19b18b1a26f6137ed1b1d4293e7a4a82b2f2e0669e01f1adee853ea255f8bf84f7f20e0604541eba9bd003ea48eb08ec

  • SSDEEP

    6144:nNGfnZRxOJboCdUVgZM+qEEr5MCOQ4fT02iJrC4b7BEnh+g1Z9Pj8/TCm:NGfnXgbhlG+v1nl4bJ2wBEwgS/R

Malware Config

Extracted

Family

redline

Botnet

@kaaazzs

C2

185.230.143.48:14462

Targets

    • Target

      5cf8a907326056ddf6e900a177834441a646aff15a191466ec70a8aab7672fed

    • Size

      581KB

    • MD5

      c473aae9581771d04ac0c67b92ddfbb7

    • SHA1

      4644ece22673361405ca9fddbbdcc930abae9197

    • SHA256

      5cf8a907326056ddf6e900a177834441a646aff15a191466ec70a8aab7672fed

    • SHA512

      da562af876c113f967c1d50a6d0f4dbb19b18b1a26f6137ed1b1d4293e7a4a82b2f2e0669e01f1adee853ea255f8bf84f7f20e0604541eba9bd003ea48eb08ec

    • SSDEEP

      6144:nNGfnZRxOJboCdUVgZM+qEEr5MCOQ4fT02iJrC4b7BEnh+g1Z9Pj8/TCm:NGfnXgbhlG+v1nl4bJ2wBEwgS/R

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks