General

  • Target

    35894e79066adf5f7864773304afa868c018953b5ce998240afc6b177246c724

  • Size

    412KB

  • Sample

    241110-ma3caavfld

  • MD5

    e7fb7257e9a6d1c0409847b7e970ff94

  • SHA1

    1e6f49e7d0cdc55dc29e57f3b25c896dc1b79210

  • SHA256

    35894e79066adf5f7864773304afa868c018953b5ce998240afc6b177246c724

  • SHA512

    ad692fce34815470ddc5dabee305edaa206c83d561d59a83a6a3e18ac2ea775cab7b00ce5c72da2ea2b1cee5f3b8a3c632968cb89b8569ff8414b9813758d70b

  • SSDEEP

    6144:jrSGxceQJzzdh8SKjRF5CzioGhDDSNBRQfQrQnQ2fwB3mJhnRKZ:fjxcnFzdh4g2x5ON7QIrN2fwB2P

Malware Config

Extracted

Family

redline

Botnet

money

C2

45.142.215.47:27643

Attributes
  • auth_value

    9491a1c5e11eb6097e68a4fa8627fda8

Targets

    • Target

      35894e79066adf5f7864773304afa868c018953b5ce998240afc6b177246c724

    • Size

      412KB

    • MD5

      e7fb7257e9a6d1c0409847b7e970ff94

    • SHA1

      1e6f49e7d0cdc55dc29e57f3b25c896dc1b79210

    • SHA256

      35894e79066adf5f7864773304afa868c018953b5ce998240afc6b177246c724

    • SHA512

      ad692fce34815470ddc5dabee305edaa206c83d561d59a83a6a3e18ac2ea775cab7b00ce5c72da2ea2b1cee5f3b8a3c632968cb89b8569ff8414b9813758d70b

    • SSDEEP

      6144:jrSGxceQJzzdh8SKjRF5CzioGhDDSNBRQfQrQnQ2fwB3mJhnRKZ:fjxcnFzdh4g2x5ON7QIrN2fwB2P

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks