General

  • Target

    7578cbbfe4b1dd5207e6aef6e3c35c2474c940df35623326b6527d2d5d506bd4

  • Size

    412KB

  • Sample

    241110-tg2snazhje

  • MD5

    420edbfe29dc6a09324fc103f84fac2a

  • SHA1

    f36a5cd26dd3d40006de7773fc6a0736650589a4

  • SHA256

    7578cbbfe4b1dd5207e6aef6e3c35c2474c940df35623326b6527d2d5d506bd4

  • SHA512

    9f88f97f73786bc172f2e1eea9d4ccc5e6d25c5f52fcccdf069a56fbc9e405d6910fb61e2acb7cf17eb682c66285fcd54bafefe65959bf409df7b39dd89ea92d

  • SSDEEP

    12288:ujbmZvqx+PI5YrAIq7z5UUrpesBBIDov:Fsxdm0IuUqesN

Malware Config

Extracted

Family

redline

Botnet

money

C2

45.142.215.47:27643

Attributes
  • auth_value

    9491a1c5e11eb6097e68a4fa8627fda8

Targets

    • Target

      7578cbbfe4b1dd5207e6aef6e3c35c2474c940df35623326b6527d2d5d506bd4

    • Size

      412KB

    • MD5

      420edbfe29dc6a09324fc103f84fac2a

    • SHA1

      f36a5cd26dd3d40006de7773fc6a0736650589a4

    • SHA256

      7578cbbfe4b1dd5207e6aef6e3c35c2474c940df35623326b6527d2d5d506bd4

    • SHA512

      9f88f97f73786bc172f2e1eea9d4ccc5e6d25c5f52fcccdf069a56fbc9e405d6910fb61e2acb7cf17eb682c66285fcd54bafefe65959bf409df7b39dd89ea92d

    • SSDEEP

      12288:ujbmZvqx+PI5YrAIq7z5UUrpesBBIDov:Fsxdm0IuUqesN

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks