General

  • Target

    67503fab5629f907159dccd2cb1271d6b29e2ea961c3933006dd0d9d63e7b336

  • Size

    333KB

  • Sample

    241110-m7yelaymcq

  • MD5

    f06ccb88357f8dcbcdf069a30f554a22

  • SHA1

    b419a169d5121f30ee9207532e3aab2b9fd93f40

  • SHA256

    67503fab5629f907159dccd2cb1271d6b29e2ea961c3933006dd0d9d63e7b336

  • SHA512

    a03bd45fb585b7e8c53db5cf2ef3bc5e053023993932bf952cb887538a5369d6d1c77e0faf75b004b1f9b0098c9c161030d08f4d4c2d62602b366db564a912ad

  • SSDEEP

    6144:HYtyEx5A/V++UdOqx9y0XkUSYPIX5Q4+twXJkmNBP0c:6vxOt++fqx9/1SYwX5LXvP0c

Malware Config

Extracted

Family

redline

Botnet

MESSI22

C2

74.119.195.242:18417

Targets

    • Target

      67503fab5629f907159dccd2cb1271d6b29e2ea961c3933006dd0d9d63e7b336

    • Size

      333KB

    • MD5

      f06ccb88357f8dcbcdf069a30f554a22

    • SHA1

      b419a169d5121f30ee9207532e3aab2b9fd93f40

    • SHA256

      67503fab5629f907159dccd2cb1271d6b29e2ea961c3933006dd0d9d63e7b336

    • SHA512

      a03bd45fb585b7e8c53db5cf2ef3bc5e053023993932bf952cb887538a5369d6d1c77e0faf75b004b1f9b0098c9c161030d08f4d4c2d62602b366db564a912ad

    • SSDEEP

      6144:HYtyEx5A/V++UdOqx9y0XkUSYPIX5Q4+twXJkmNBP0c:6vxOt++fqx9/1SYwX5LXvP0c

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks