General

  • Target

    42a2b9706cb477fd8d6f572d672545bd16044229bd52523625d6f17aab9ec8c7

  • Size

    391KB

  • Sample

    241110-mfmtsaxrfq

  • MD5

    9fc3b630c44deafe869763e20b8cfeb1

  • SHA1

    0dfc871a264fd22a5e10fb3282540df80a3e492e

  • SHA256

    42a2b9706cb477fd8d6f572d672545bd16044229bd52523625d6f17aab9ec8c7

  • SHA512

    cc6badd93ac96ef5fad797a7f8a24772551d306a2d4b8f53b5e6529e6f7dd0f5c137927eb2831878e31b592e715dd2ecbc1a00de7a04e6b7677f573b7964ca4a

  • SSDEEP

    6144:mbxitU+sx4UkviP14XYsljWap+PQvgk2fm85:gSU+sx4Bid4oSjP8PkB2

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      42a2b9706cb477fd8d6f572d672545bd16044229bd52523625d6f17aab9ec8c7

    • Size

      391KB

    • MD5

      9fc3b630c44deafe869763e20b8cfeb1

    • SHA1

      0dfc871a264fd22a5e10fb3282540df80a3e492e

    • SHA256

      42a2b9706cb477fd8d6f572d672545bd16044229bd52523625d6f17aab9ec8c7

    • SHA512

      cc6badd93ac96ef5fad797a7f8a24772551d306a2d4b8f53b5e6529e6f7dd0f5c137927eb2831878e31b592e715dd2ecbc1a00de7a04e6b7677f573b7964ca4a

    • SSDEEP

      6144:mbxitU+sx4UkviP14XYsljWap+PQvgk2fm85:gSU+sx4Bid4oSjP8PkB2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks