General

  • Target

    cd83a76ea4ca83c4522be05acdeeaf324c738c24918935ca2be52f477409e4f9

  • Size

    318KB

  • Sample

    241110-mcjyqatqg1

  • MD5

    b74ab268bb040b72803757e67bbd4af1

  • SHA1

    5f9da453f8d4ab5996d9c78994399736dae2f93e

  • SHA256

    cd83a76ea4ca83c4522be05acdeeaf324c738c24918935ca2be52f477409e4f9

  • SHA512

    cea2751e9341569b657edb15a228a92e89dce3d0940a31d985b19826d15f2067b944fea6532c36ddb321710c65b78aa0c02bc4416f452bcfb20c54ff7bced3f7

  • SSDEEP

    6144:ptZQiC2z1aQYuFVFfvKhwtngCNBMJqAvZEpvhtOqUbMpoGwuPc8:nZVz1avuxvKyZ9WZE9hUN5

Malware Config

Extracted

Family

redline

Botnet

PUB

C2

45.9.20.20:13441

Targets

    • Target

      cd83a76ea4ca83c4522be05acdeeaf324c738c24918935ca2be52f477409e4f9

    • Size

      318KB

    • MD5

      b74ab268bb040b72803757e67bbd4af1

    • SHA1

      5f9da453f8d4ab5996d9c78994399736dae2f93e

    • SHA256

      cd83a76ea4ca83c4522be05acdeeaf324c738c24918935ca2be52f477409e4f9

    • SHA512

      cea2751e9341569b657edb15a228a92e89dce3d0940a31d985b19826d15f2067b944fea6532c36ddb321710c65b78aa0c02bc4416f452bcfb20c54ff7bced3f7

    • SSDEEP

      6144:ptZQiC2z1aQYuFVFfvKhwtngCNBMJqAvZEpvhtOqUbMpoGwuPc8:nZVz1avuxvKyZ9WZE9hUN5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks