General

  • Target

    479ce032355c48ae3da3693c115a9e0bae5e64ee11d0eba4c9d221362afe08ca

  • Size

    256KB

  • Sample

    241110-m3fc8avlfz

  • MD5

    fe06e1d6ee35a137725d78b157fc2a9c

  • SHA1

    eeae4d7d64951e0691c4a5a426967b9e209b2a7c

  • SHA256

    479ce032355c48ae3da3693c115a9e0bae5e64ee11d0eba4c9d221362afe08ca

  • SHA512

    d52ea37c68fb05361398ae0c5968c54b4fc5f3b5f88c0abf6bd35beb26236d7e2624c25f2578ba795fbd52c287841d2a24aeaa7a1e2fbb111ea795613e476083

  • SSDEEP

    3072:DzXq8tLsFecn7iNcQGK9Kv8/d6OMBcy/2sITdI9xawqI965tgPF3GvV:DzaFeA7iN1T9K4d6O7yUTe9sjJgPA9

Malware Config

Extracted

Family

redline

C2

185.215.113.29:8678

Targets

    • Target

      479ce032355c48ae3da3693c115a9e0bae5e64ee11d0eba4c9d221362afe08ca

    • Size

      256KB

    • MD5

      fe06e1d6ee35a137725d78b157fc2a9c

    • SHA1

      eeae4d7d64951e0691c4a5a426967b9e209b2a7c

    • SHA256

      479ce032355c48ae3da3693c115a9e0bae5e64ee11d0eba4c9d221362afe08ca

    • SHA512

      d52ea37c68fb05361398ae0c5968c54b4fc5f3b5f88c0abf6bd35beb26236d7e2624c25f2578ba795fbd52c287841d2a24aeaa7a1e2fbb111ea795613e476083

    • SSDEEP

      3072:DzXq8tLsFecn7iNcQGK9Kv8/d6OMBcy/2sITdI9xawqI965tgPF3GvV:DzaFeA7iN1T9K4d6O7yUTe9sjJgPA9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks