General

  • Target

    260e55a51229175e4f00fed55cd5be455cbedb44e55024d782b13f970b9d5ce4

  • Size

    409KB

  • Sample

    241110-hvkwhssbll

  • MD5

    a29b915ef986ac0e78c582fb8548ec0b

  • SHA1

    cf097ad14154ed02420ccd137fbdb319ffb6a01c

  • SHA256

    260e55a51229175e4f00fed55cd5be455cbedb44e55024d782b13f970b9d5ce4

  • SHA512

    1ecfa38c68ed8e004f269379b2a102c7f3e9b5335c8d7bf713ab86c1d0d131dd220d498dbfc98f2ade841536c94977a566a44e226583c03cbe781434959b74a5

  • SSDEEP

    12288:6A+YDY8K0TKNcWp2X9yjhtf8Rgjm8USt1LAK:6pYMEK2kRWgS8U8RAK

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Attributes
  • auth_value

    a272f3a2850ec3dccdaed97234b7c40e

Targets

    • Target

      260e55a51229175e4f00fed55cd5be455cbedb44e55024d782b13f970b9d5ce4

    • Size

      409KB

    • MD5

      a29b915ef986ac0e78c582fb8548ec0b

    • SHA1

      cf097ad14154ed02420ccd137fbdb319ffb6a01c

    • SHA256

      260e55a51229175e4f00fed55cd5be455cbedb44e55024d782b13f970b9d5ce4

    • SHA512

      1ecfa38c68ed8e004f269379b2a102c7f3e9b5335c8d7bf713ab86c1d0d131dd220d498dbfc98f2ade841536c94977a566a44e226583c03cbe781434959b74a5

    • SSDEEP

      12288:6A+YDY8K0TKNcWp2X9yjhtf8Rgjm8USt1LAK:6pYMEK2kRWgS8U8RAK

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks