General

  • Target

    7ab1bb8f1c2784f0cbf05fb51f2e1df1d81111dcb32938452e7229ef3a808784

  • Size

    43KB

  • Sample

    241110-q363qaxlft

  • MD5

    a198c61c2d22839b33667be75e2e2fb3

  • SHA1

    2ed80ae622750353cec08c6dae287bd33576b505

  • SHA256

    7ab1bb8f1c2784f0cbf05fb51f2e1df1d81111dcb32938452e7229ef3a808784

  • SHA512

    1dedb9efa6a5b552e544885b4ddb87f299e853b6f602bfdb3fa1c153e2f1f7032a32597c3272e5f1826a4e548ee3f5131e836e454a5db16a9d62b302d192a701

  • SSDEEP

    768:yZdxbehzx1XR65Sb3oLDghj8WEOL429u8DXrBDQRY/3Q08fNyqvBHjuiW4:m3GXsSbYLIj8WvXuRY/3yVnJKiW4

Malware Config

Extracted

Family

redline

Botnet

peace

C2

154.127.53.77:26061

Targets

    • Target

      fcc7eb446093f092eec4f1ba25b2608e77326b3e12df5680963504b96afc01f6.exe

    • Size

      95KB

    • MD5

      4b36463bd9f54a58c8085e92b98b0593

    • SHA1

      235d11a3452eb848dedf64d6eaef01f47b7de57e

    • SHA256

      fcc7eb446093f092eec4f1ba25b2608e77326b3e12df5680963504b96afc01f6

    • SHA512

      bafb212479e5523fdca3947b043f1e7fc6a3f62a0f62aa3694b1d33ef9f16bb930a75bf9af93a07f5da542079926f7f0844410fc25b41b8e1ef075fc610c118f

    • SSDEEP

      1536:9qsINqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2steulgS6pY:rAMOY3+zi0ZbYe1g0ujyzdcY

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks