General

  • Target

    2250b2550c7ae3cd72b37cb0108b36c61bb40699b83fc18ed5ce89d0ca11c1d0

  • Size

    381KB

  • Sample

    241110-nqxmeayqar

  • MD5

    48c39f82a9cf4a08ac1a0ece206d144b

  • SHA1

    d76affd8afa700b904cfe2c13de258bd6e86207f

  • SHA256

    2250b2550c7ae3cd72b37cb0108b36c61bb40699b83fc18ed5ce89d0ca11c1d0

  • SHA512

    a97f95c4177901efa819650704c7d0e769842a611f1482362ca95c5e4b5d96e9fc9a2299b698d912a533dd9086aab1b0e4590d4b48c5162084f77a6473fbc9d1

  • SSDEEP

    6144:8xF57PxglJSoFHVajId9mUW4KIGJHrcsBStteY5DIo/kORuRF7PESe5tfwDzKC9b:Y57PxglJBF59m8NGpkQGx8OR2F7PujwL

Malware Config

Extracted

Family

redline

Botnet

PUB

C2

45.9.20.20:13441

Targets

    • Target

      2250b2550c7ae3cd72b37cb0108b36c61bb40699b83fc18ed5ce89d0ca11c1d0

    • Size

      381KB

    • MD5

      48c39f82a9cf4a08ac1a0ece206d144b

    • SHA1

      d76affd8afa700b904cfe2c13de258bd6e86207f

    • SHA256

      2250b2550c7ae3cd72b37cb0108b36c61bb40699b83fc18ed5ce89d0ca11c1d0

    • SHA512

      a97f95c4177901efa819650704c7d0e769842a611f1482362ca95c5e4b5d96e9fc9a2299b698d912a533dd9086aab1b0e4590d4b48c5162084f77a6473fbc9d1

    • SSDEEP

      6144:8xF57PxglJSoFHVajId9mUW4KIGJHrcsBStteY5DIo/kORuRF7PESe5tfwDzKC9b:Y57PxglJBF59m8NGpkQGx8OR2F7PujwL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks