General

  • Target

    9ac429fbd08d4f6c9c80a6c312d8ac9e707f6e383f75a92aa142d24d358282a5

  • Size

    43KB

  • Sample

    241110-nf8lxswdkd

  • MD5

    d8b77ac5c1b36655eb62069dafc67700

  • SHA1

    19c9d6f04522014f0c7694ba49b53fc5b951b75e

  • SHA256

    9ac429fbd08d4f6c9c80a6c312d8ac9e707f6e383f75a92aa142d24d358282a5

  • SHA512

    20034b22720fe6ac23cffa6d2b58a64ce691a57633a9fc09bbf67b58829100c8f88b5e4b6f15f0c6f5b41871c47462e5863ae727795093cbaa9e215e4d157813

  • SSDEEP

    768:4jCWUxEt0bafNSXcOH/k+SGZ7snluZu4ggBovnWx7zwFBSEAiN0OhN:0PObGIxfk+SGZyOVgOYnA7OAiN0Oj

Malware Config

Extracted

Family

redline

Botnet

1111111

C2

188.34.194.107:44644

Targets

    • Target

      12aec3ae5c5828745e45a86fedbb1ff4c0631855f8e76d63f0ac7fb554d5afc3

    • Size

      95KB

    • MD5

      b47d198865b257ec460d399e6eabf2f7

    • SHA1

      91d6ba1ed98b76730dca1f9a513f8779c442c6ee

    • SHA256

      12aec3ae5c5828745e45a86fedbb1ff4c0631855f8e76d63f0ac7fb554d5afc3

    • SHA512

      af348566dbaa38334deaa1f6402f9667d1ea57684220c018119acd4b1152a989fa657a19fe6778eb4545f15a3ca4d8ae8c81c6e8f2bca5035c38d9d80170f2c8

    • SSDEEP

      1536:Vqse5qeUlbG6jejoigI843Ywzi0Zb78ivombfexv0ujXyyed24tmulgS6pA:TylMY8+zi0ZbYe1g0ujyzdEA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks