General

  • Target

    3eebf82920c2c080323b914d8ef796de5099ac678090f19c0fb9d585d5441634

  • Size

    318KB

  • Sample

    241110-vkz9nszqgz

  • MD5

    c227714b6bc17e7b6928df98858f79ec

  • SHA1

    9764751793a242ca0226a192469884216a4731f1

  • SHA256

    3eebf82920c2c080323b914d8ef796de5099ac678090f19c0fb9d585d5441634

  • SHA512

    0f258db7e1a6a190311f427f8ccf69a1d2826c37829ca3a2c8eb95d5d6f7733861329a0cd5f0d022d9725d788042bab5ebbf7ec32d75af0b5bde840a3c267761

  • SSDEEP

    6144:1Sp7LnxCQem2q1Xe+/Rqjs1hSy+UDtcdtjLVBJECzl+XsB+O:gbxCQem24RqjChXJ+pgCC

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      3eebf82920c2c080323b914d8ef796de5099ac678090f19c0fb9d585d5441634

    • Size

      318KB

    • MD5

      c227714b6bc17e7b6928df98858f79ec

    • SHA1

      9764751793a242ca0226a192469884216a4731f1

    • SHA256

      3eebf82920c2c080323b914d8ef796de5099ac678090f19c0fb9d585d5441634

    • SHA512

      0f258db7e1a6a190311f427f8ccf69a1d2826c37829ca3a2c8eb95d5d6f7733861329a0cd5f0d022d9725d788042bab5ebbf7ec32d75af0b5bde840a3c267761

    • SSDEEP

      6144:1Sp7LnxCQem2q1Xe+/Rqjs1hSy+UDtcdtjLVBJECzl+XsB+O:gbxCQem24RqjChXJ+pgCC

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks