General

  • Target

    152b529e3a1fc018dc324ec860b94ca71e43658106d4d07abc8b1caaa9b59376

  • Size

    359KB

  • Sample

    241110-dtg11sycln

  • MD5

    3f069989ff5d9619230393e3254afe9d

  • SHA1

    f427fed1e9549445d3ef2cf21c4d5324457fd8e4

  • SHA256

    152b529e3a1fc018dc324ec860b94ca71e43658106d4d07abc8b1caaa9b59376

  • SHA512

    779810affec72e86a3899646a8cd37a8862e8216ba211f38b36e85e244e92afeaef5bd610eccdfb725e0950bc1cda600c18c5f761d5b4978b75b784c0ab2b596

  • SSDEEP

    3072:/F/fiaVH9yGDmoHIj1//3RDE6w6i9S20kezr/+AKLCRHwgXIh7lp0W8SU676NU19:N/aq9Dmr1//BDBSbuRuRoWA67eU1Y

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.20:13441

Targets

    • Target

      152b529e3a1fc018dc324ec860b94ca71e43658106d4d07abc8b1caaa9b59376

    • Size

      359KB

    • MD5

      3f069989ff5d9619230393e3254afe9d

    • SHA1

      f427fed1e9549445d3ef2cf21c4d5324457fd8e4

    • SHA256

      152b529e3a1fc018dc324ec860b94ca71e43658106d4d07abc8b1caaa9b59376

    • SHA512

      779810affec72e86a3899646a8cd37a8862e8216ba211f38b36e85e244e92afeaef5bd610eccdfb725e0950bc1cda600c18c5f761d5b4978b75b784c0ab2b596

    • SSDEEP

      3072:/F/fiaVH9yGDmoHIj1//3RDE6w6i9S20kezr/+AKLCRHwgXIh7lp0W8SU676NU19:N/aq9Dmr1//BDBSbuRuRoWA67eU1Y

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks