General

  • Target

    3401188a34dbf71336f46e8ec5019db4f12b1d137201166982d00d3c2c3f3d6c

  • Size

    10.2MB

  • Sample

    241110-n6jeqawgrg

  • MD5

    8bdde3c996a88c9a91d3827c7953cce7

  • SHA1

    ac38cbe51f3db755e7581d3578f79988b873a8e7

  • SHA256

    3401188a34dbf71336f46e8ec5019db4f12b1d137201166982d00d3c2c3f3d6c

  • SHA512

    e81cb480cf95801447f89907355c94cee82435a8f4c25438b0ea2a90a3a591b4c440271c744d2d7ed68568d5f3eebdf64a6183f522b7290d94433b054a5d2aab

  • SSDEEP

    196608:Vi22DjJklRW57tye0TmknK0725IVZYn0YN6aAVFkuK2ok6g5I:Q/JklR0QmkDiQZiNhATTK2dha

Malware Config

Extracted

Family

redline

Botnet

adsgoogle2

C2

45.93.4.12:80

Targets

    • Target

      1e936a3027bad9d485df3d0356a8c8a22838851a66dfa7708e57855cfe54ded0

    • Size

      10.5MB

    • MD5

      b5517915ec684b56531b34245b320b72

    • SHA1

      26317275130e0be9e630be426e0854dc7d711308

    • SHA256

      1e936a3027bad9d485df3d0356a8c8a22838851a66dfa7708e57855cfe54ded0

    • SHA512

      44a404a7d42f1916746c175ca9f6dbd979a6e1598b3571011def74db66d0119bbeabe31809c0a262fd65621be22a88a17c95afda13de74f5efbdb34ca294198b

    • SSDEEP

      196608:4WMBOcvNzrpn0PYnTpPQK1AWNzfX8xFXnYHu11YjohYOP4sAwBKSX:4jFBp0+QKZGDXYboYOP4mKW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks