General

  • Target

    80ed75a27a17aa0caf9485eb05c973b151eb6d61cb717621ff14c522f8da641a

  • Size

    323KB

  • Sample

    241110-zhvcvsxqek

  • MD5

    810c83d4a4f29ebd4f58186ff6f68c39

  • SHA1

    fa440086ae2f9983963bac1146e0d5374d28ae47

  • SHA256

    80ed75a27a17aa0caf9485eb05c973b151eb6d61cb717621ff14c522f8da641a

  • SHA512

    8eb4195c5f898c4e8cdf292c85dac155865324c4afd3b71212339df7bdf82a1144ba3b729ace66c54b73926add04e764976e4ea42ced05bbb67a1ac8b063954f

  • SSDEEP

    3072:t9za0uHQBQegolyF/seoV3AHJgvig+4PDefWjKm34KeSGubnCy5Ty7YWnWnCNeoB:wQdJoF/e+avigx1/eSGDUdWWCIw4fks

Malware Config

Extracted

Family

redline

Botnet

SewPalpadin

C2

185.215.113.114:8887

Targets

    • Target

      80ed75a27a17aa0caf9485eb05c973b151eb6d61cb717621ff14c522f8da641a

    • Size

      323KB

    • MD5

      810c83d4a4f29ebd4f58186ff6f68c39

    • SHA1

      fa440086ae2f9983963bac1146e0d5374d28ae47

    • SHA256

      80ed75a27a17aa0caf9485eb05c973b151eb6d61cb717621ff14c522f8da641a

    • SHA512

      8eb4195c5f898c4e8cdf292c85dac155865324c4afd3b71212339df7bdf82a1144ba3b729ace66c54b73926add04e764976e4ea42ced05bbb67a1ac8b063954f

    • SSDEEP

      3072:t9za0uHQBQegolyF/seoV3AHJgvig+4PDefWjKm34KeSGubnCy5Ty7YWnWnCNeoB:wQdJoF/e+avigx1/eSGDUdWWCIw4fks

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks