General

  • Target

    7c97f0deaa47de819fab1ddd525858b40cd57d6c8c81bb757884d9e446414c66

  • Size

    317KB

  • Sample

    241110-tb34jazgje

  • MD5

    1beb3bf1a30660549752bfc6173b9cbd

  • SHA1

    62679c03fdebb32a4525d8ab1315cad1f0269eb9

  • SHA256

    7c97f0deaa47de819fab1ddd525858b40cd57d6c8c81bb757884d9e446414c66

  • SHA512

    9b2eac74bd8b1b2b309e7eeab10b01b6458f464b6abe7e0494719d8129d6775f850d10294d5e31f822896dce6f157679e45cc8860e7449d36c280f8bd0d3c3ae

  • SSDEEP

    6144:wCZQpuCn0CzqU7qX7nQbV8Zme/WdMNKxz0LOsxKpX3PfSgh:dZ4n0CzqUWDQb6oc2MvxS3Sg

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      7c97f0deaa47de819fab1ddd525858b40cd57d6c8c81bb757884d9e446414c66

    • Size

      317KB

    • MD5

      1beb3bf1a30660549752bfc6173b9cbd

    • SHA1

      62679c03fdebb32a4525d8ab1315cad1f0269eb9

    • SHA256

      7c97f0deaa47de819fab1ddd525858b40cd57d6c8c81bb757884d9e446414c66

    • SHA512

      9b2eac74bd8b1b2b309e7eeab10b01b6458f464b6abe7e0494719d8129d6775f850d10294d5e31f822896dce6f157679e45cc8860e7449d36c280f8bd0d3c3ae

    • SSDEEP

      6144:wCZQpuCn0CzqU7qX7nQbV8Zme/WdMNKxz0LOsxKpX3PfSgh:dZ4n0CzqUWDQb6oc2MvxS3Sg

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks