General

  • Target

    a868114ce7b9dfb1bdd0e0850dceeb51ca50262fdf2896347f3cb11bde7e57d5

  • Size

    413KB

  • Sample

    241110-h1ftravpdm

  • MD5

    2e24ad664c74f38e04bc8ea5bb217431

  • SHA1

    229cf3fc7b8f0190de6e41e17cbfa2f24375b393

  • SHA256

    a868114ce7b9dfb1bdd0e0850dceeb51ca50262fdf2896347f3cb11bde7e57d5

  • SHA512

    3d0f66ec8e675411b3a61aee56ce2053bb93ad399e164d3e55ba1a318f275a29981c61b737e7b903d94b94e916df50c5c9d60934745b5edeb27b417c19a733a7

  • SSDEEP

    6144:lXQxT7RvFnif5QhFbbQnTUyUntk7rrPypaiLuOMFMhkduCn10vErY:lAxlAfK3HMTZGmXrP6aiLWFMhkd91g5

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.20:13441

Targets

    • Target

      a868114ce7b9dfb1bdd0e0850dceeb51ca50262fdf2896347f3cb11bde7e57d5

    • Size

      413KB

    • MD5

      2e24ad664c74f38e04bc8ea5bb217431

    • SHA1

      229cf3fc7b8f0190de6e41e17cbfa2f24375b393

    • SHA256

      a868114ce7b9dfb1bdd0e0850dceeb51ca50262fdf2896347f3cb11bde7e57d5

    • SHA512

      3d0f66ec8e675411b3a61aee56ce2053bb93ad399e164d3e55ba1a318f275a29981c61b737e7b903d94b94e916df50c5c9d60934745b5edeb27b417c19a733a7

    • SSDEEP

      6144:lXQxT7RvFnif5QhFbbQnTUyUntk7rrPypaiLuOMFMhkduCn10vErY:lAxlAfK3HMTZGmXrP6aiLWFMhkd91g5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks