General

  • Target

    45ddfe4f8fa07f364d409f21ed6392150aa80fb46ea36323601f1dd126deedff

  • Size

    360KB

  • Sample

    241110-hwt6ks1pcs

  • MD5

    1568bca4a2f36eff4888202a8c6fd69f

  • SHA1

    f20a7b8b7d9e893670aeb5da5c3b4566267304e8

  • SHA256

    45ddfe4f8fa07f364d409f21ed6392150aa80fb46ea36323601f1dd126deedff

  • SHA512

    7e94d3579cc1229417083391e97d6779f985dbaf1c66b2d2d378c003d8272dd6d7ebc328f3aca50a150d8b2d3d823910175f3de1d46fcbdd23c1e3256a52a66f

  • SSDEEP

    6144:C6ORZ3AYpOPFh7qutUv/AP2TZZwr4B9oRanwvuHbJU6ieWH15Vt2:Cvf3A0Odqumnk2Ir0oiwWHbVfWH17k

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.20:13441

Targets

    • Target

      45ddfe4f8fa07f364d409f21ed6392150aa80fb46ea36323601f1dd126deedff

    • Size

      360KB

    • MD5

      1568bca4a2f36eff4888202a8c6fd69f

    • SHA1

      f20a7b8b7d9e893670aeb5da5c3b4566267304e8

    • SHA256

      45ddfe4f8fa07f364d409f21ed6392150aa80fb46ea36323601f1dd126deedff

    • SHA512

      7e94d3579cc1229417083391e97d6779f985dbaf1c66b2d2d378c003d8272dd6d7ebc328f3aca50a150d8b2d3d823910175f3de1d46fcbdd23c1e3256a52a66f

    • SSDEEP

      6144:C6ORZ3AYpOPFh7qutUv/AP2TZZwr4B9oRanwvuHbJU6ieWH15Vt2:Cvf3A0Odqumnk2Ir0oiwWHbVfWH17k

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks