General

  • Target

    62567b47f541700af4204dbbb54f8becca6bec3d149214a2375526c9bc3f7e2a

  • Size

    414KB

  • Sample

    241110-hx987asdnc

  • MD5

    0622e0c41e5e451e61e7a0a084e39275

  • SHA1

    857baf212201e9262ecd57f523a826c623fa11a8

  • SHA256

    62567b47f541700af4204dbbb54f8becca6bec3d149214a2375526c9bc3f7e2a

  • SHA512

    5b1ec159a8ff1a929a6d4d17fbd574194bf65be23a7d765e7c74cb728e34df8fcfa45bdc71689ec4028c39d0396cdf2bd854ff78cb937263b420e0ce79eabf6b

  • SSDEEP

    6144:UUfLzMXHg96/T6+trrpBn7Qh4jyeyVqNNLR+3DpFd7u36vIZkEd:1fJk/tvpB7K4WeyVqNNLipFd7uKsD

Malware Config

Extracted

Family

redline

Botnet

money

C2

45.142.215.47:27643

Attributes
  • auth_value

    9491a1c5e11eb6097e68a4fa8627fda8

Targets

    • Target

      62567b47f541700af4204dbbb54f8becca6bec3d149214a2375526c9bc3f7e2a

    • Size

      414KB

    • MD5

      0622e0c41e5e451e61e7a0a084e39275

    • SHA1

      857baf212201e9262ecd57f523a826c623fa11a8

    • SHA256

      62567b47f541700af4204dbbb54f8becca6bec3d149214a2375526c9bc3f7e2a

    • SHA512

      5b1ec159a8ff1a929a6d4d17fbd574194bf65be23a7d765e7c74cb728e34df8fcfa45bdc71689ec4028c39d0396cdf2bd854ff78cb937263b420e0ce79eabf6b

    • SSDEEP

      6144:UUfLzMXHg96/T6+trrpBn7Qh4jyeyVqNNLR+3DpFd7u36vIZkEd:1fJk/tvpB7K4WeyVqNNLipFd7uKsD

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks