General

  • Target

    b9f9dd20eff21bc95101303ef548754476baa09055fca93c17b67adea421f171

  • Size

    292KB

  • Sample

    241110-nht7bavpbv

  • MD5

    ba4a8705fda8638a061461c1e257fd4a

  • SHA1

    605ba2b0a9225a1271ae49b9191ce7ad60d3d7e8

  • SHA256

    b9f9dd20eff21bc95101303ef548754476baa09055fca93c17b67adea421f171

  • SHA512

    389ab1b8da50345f598f56720bc219aca75020800fbdc74aa938b7284e4d3a1c1ded1d55a2fa73bd6586c9c1015882618b9462e736f14673f1647427c4c1ef84

  • SSDEEP

    3072:LY9QSHF8Tkq1H8eFt+IgxIFlI7Wr1niUrA3IE15nxlwLRA8AzLlo5nkOQsWvnGEe:fSHU8eFtiITIdwA3IE1tYyJ/Q+AsMX2

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      b9f9dd20eff21bc95101303ef548754476baa09055fca93c17b67adea421f171

    • Size

      292KB

    • MD5

      ba4a8705fda8638a061461c1e257fd4a

    • SHA1

      605ba2b0a9225a1271ae49b9191ce7ad60d3d7e8

    • SHA256

      b9f9dd20eff21bc95101303ef548754476baa09055fca93c17b67adea421f171

    • SHA512

      389ab1b8da50345f598f56720bc219aca75020800fbdc74aa938b7284e4d3a1c1ded1d55a2fa73bd6586c9c1015882618b9462e736f14673f1647427c4c1ef84

    • SSDEEP

      3072:LY9QSHF8Tkq1H8eFt+IgxIFlI7Wr1niUrA3IE15nxlwLRA8AzLlo5nkOQsWvnGEe:fSHU8eFtiITIdwA3IE1tYyJ/Q+AsMX2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks