General

  • Target

    12b03c30c31476d7a913dbc745480ea617784098

  • Size

    43KB

  • Sample

    241110-ythyjavalc

  • MD5

    09fd14708b8c84f1e961f8a73a5b4d79

  • SHA1

    12b03c30c31476d7a913dbc745480ea617784098

  • SHA256

    1845d7d7bb9936c2a57ec608504ec2c59bfd1a450d7d5c40dc012cb0724b2b93

  • SHA512

    77b586ff37c4c0f256c54a5cae24be2cf7b2609e80a8641ac65228eb5b92d9b588d9f3a2649c0e61ad543109320c661bd2cbb7f0307a28397759877f6d5f2787

  • SSDEEP

    768:QSYu+f+96dJiDdTnzVjsDU/uKPPs9lA0vy7z2Ewzz:QS3+f+kSjzVjFBPglA0K7z4zz

Malware Config

Extracted

Family

redline

Botnet

test

C2

176.195.236.15:24002

Targets

    • Target

      1949a4207e49ae6254827592a30511e334c0a6ad1a897019b61d0ee0a212c169

    • Size

      95KB

    • MD5

      76793f6d92c7d7f4afec94b8f37da933

    • SHA1

      161125b3081eb311b2f4e3bc5cb2da9c5dad5c40

    • SHA256

      1949a4207e49ae6254827592a30511e334c0a6ad1a897019b61d0ee0a212c169

    • SHA512

      78535e291fceee09563d2c8ff679826182676ffc5ef8c04eb73e8dc6a9d6b3bde4bd79a619b10cea49f4b4c9c4471790a64855d434ba732188daaa08b2b4d499

    • SSDEEP

      1536:9qsCNqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2Z3teulgS6pY:rOMOY3+zi0ZbYe1g0ujyzdBY

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks