General

  • Target

    dfef9480066373672ca815b2ea5dfa7f

  • Size

    490KB

  • Sample

    241110-e35n4sspdq

  • MD5

    dfef9480066373672ca815b2ea5dfa7f

  • SHA1

    5852a71baa19fa664e3f8a4ec23b998d17ec27a5

  • SHA256

    9ee58196efed5d652dbb5621460487125a8e86e24b1948352fa9ad2eb5327d42

  • SHA512

    e048464c6890db5f8578fd56dc3e78c42b942da4927d805aab3669af1a9316e91df91e7279f194ae3b514cad51dd39e1bec268b0e8dcae3a63eff220de55fd21

  • SSDEEP

    12288:Xk7v8PP9D7idZUYDb8cmm7Asydwa7jYUm29dF5CD8R:Xk70n9D7o8cR+dt7j5m+MD8R

Malware Config

Extracted

Family

redline

Botnet

sB9s5YLxvJ

C2

192.3.223.202:3652

Targets

    • Target

      374ea99fca7187421ea94e7cd3e285060d708b4ace157dae1461346e7f562958.exe

    • Size

      600KB

    • MD5

      eb4bb57d219fee37c90ce789a70f2aa6

    • SHA1

      774237a13c86abc1204068ddda02854a6832664f

    • SHA256

      374ea99fca7187421ea94e7cd3e285060d708b4ace157dae1461346e7f562958

    • SHA512

      ac882779531634b5657b181963823b1a50233936b4a4b024bf69bb66b74a2bea531bf78cf6dd198142b5a6d8d0a116ac58ba31f50c76ae7e6fa9731d58a5c4e3

    • SSDEEP

      12288:y/7MFu3XDG2bJ16DiykNwGxzT7mbQ5k6SCmOhzzFRioge:y/7xG2qGZxn7mbj6SzOB7ioge

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks