General

  • Target

    01aeefb0c3c388681206ac6262ff926576d53b9ecfdc55fbb1df77c2c6356228

  • Size

    136KB

  • Sample

    241110-e99lmssqer

  • MD5

    d1bfd4d0b3d0e4345bbc554bdd2a2ee0

  • SHA1

    4795d5a77edeab1bce3e2a94b4b275cf234c6aec

  • SHA256

    01aeefb0c3c388681206ac6262ff926576d53b9ecfdc55fbb1df77c2c6356228

  • SHA512

    a062da9f16a89890523e7a1a206bb7a136b740cb2a898811ff249b7eec7842252efc568ebc7013debf025feed46a29d022f7d61976fe6a5d497e216ad62c8f13

  • SSDEEP

    3072:Sia0DxF//28tuuoq6AIL6X68OwzyG0V/q1gF:SixDx9u8t9XO0zyG+/qw

Malware Config

Extracted

Family

redline

Botnet

she

C2

135.181.129.119:4805

Attributes
  • auth_value

    b69102cdbd4afe2d3159f88fb6dac731

Targets

    • Target

      01aeefb0c3c388681206ac6262ff926576d53b9ecfdc55fbb1df77c2c6356228

    • Size

      136KB

    • MD5

      d1bfd4d0b3d0e4345bbc554bdd2a2ee0

    • SHA1

      4795d5a77edeab1bce3e2a94b4b275cf234c6aec

    • SHA256

      01aeefb0c3c388681206ac6262ff926576d53b9ecfdc55fbb1df77c2c6356228

    • SHA512

      a062da9f16a89890523e7a1a206bb7a136b740cb2a898811ff249b7eec7842252efc568ebc7013debf025feed46a29d022f7d61976fe6a5d497e216ad62c8f13

    • SSDEEP

      3072:Sia0DxF//28tuuoq6AIL6X68OwzyG0V/q1gF:SixDx9u8t9XO0zyG+/qw

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks