General

  • Target

    e6e0a8b05ea13e3e5b47ca20db6e0495fe58a08d97416f31cd803ecb67d919d0

  • Size

    149KB

  • Sample

    241110-kaz6tawncl

  • MD5

    8d38e68874ebfaaf5636d03a6d36ea78

  • SHA1

    e41df78b4ef5c7f4c3cc2b917e55988557ca71fd

  • SHA256

    e6e0a8b05ea13e3e5b47ca20db6e0495fe58a08d97416f31cd803ecb67d919d0

  • SHA512

    6461ee9218ede090835158f520c7d276bf18c2c98000af8386557671ebc9a2e1bda3fe8abab82cb8f8bae93278ea4e2fd2a92f34075b881ae67132c1194dc926

  • SSDEEP

    3072:AoUE9gYNf0iGSd9bShbxK2+Jc7cCD2l/2sG+IIPhW3kkYAE5YcHD+:AonJfXKx7Nw+sG+IGhokrJj+

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

51.77.167.51:46762

Targets

    • Target

      6a58dfbc3668c8d5dcf1738b42436ae8b018df84031d0615bf62ef5ef24ff89c.exe

    • Size

      235KB

    • MD5

      0121f2a3855fb555abcd9839065f212b

    • SHA1

      e105a675328c5912d95907d3edf0a6e9539729f9

    • SHA256

      6a58dfbc3668c8d5dcf1738b42436ae8b018df84031d0615bf62ef5ef24ff89c

    • SHA512

      6d48eeb49f9ad1abdb1149b809248ae5e2852c2c373ea0be58c777f8c4e8fbd6123e645ad5071708106c44527c6a7969331d916a20c2197fa120feaba33001eb

    • SSDEEP

      6144:8dKHYuG0LahybANp74u+Ew/+NtRMcSvUM:eKpaNVRz1McSs

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks