General

  • Target

    b09c7f2074758dfc652ed01f471840a2c7e48f0968983d41366a088aea49c35b

  • Size

    317KB

  • Sample

    241110-r2gbcaydrq

  • MD5

    6dd5fbc796aff8da9670eb08e5e40822

  • SHA1

    20c5029fe3db99f64e3a511acb58324d17d69df3

  • SHA256

    b09c7f2074758dfc652ed01f471840a2c7e48f0968983d41366a088aea49c35b

  • SHA512

    d45357590db22e614d72614cf6e75c296304647cc507816bff883dfbb149e9cf38f1a162dfe21ea7125ece80fd1b87e7f0c7ae0b46e9361e0ab46d080b6c4cd5

  • SSDEEP

    6144:trZQpU0n3iC6/U7qW75Qbj57CE8OmjucnPPbc5t9rxtzwS:FZUn3iC6/UWSQbFmE+Lg5t9rA

Malware Config

Extracted

Family

redline

Botnet

100k

C2

45.9.20.150:80

Targets

    • Target

      b09c7f2074758dfc652ed01f471840a2c7e48f0968983d41366a088aea49c35b

    • Size

      317KB

    • MD5

      6dd5fbc796aff8da9670eb08e5e40822

    • SHA1

      20c5029fe3db99f64e3a511acb58324d17d69df3

    • SHA256

      b09c7f2074758dfc652ed01f471840a2c7e48f0968983d41366a088aea49c35b

    • SHA512

      d45357590db22e614d72614cf6e75c296304647cc507816bff883dfbb149e9cf38f1a162dfe21ea7125ece80fd1b87e7f0c7ae0b46e9361e0ab46d080b6c4cd5

    • SSDEEP

      6144:trZQpU0n3iC6/U7qW75Qbj57CE8OmjucnPPbc5t9rxtzwS:FZUn3iC6/UWSQbFmE+Lg5t9rA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks