General

  • Target

    b5b31a17a79f7a0523e3c49d4b60c0428e46c2105e1a9e004a95c40a75bead28

  • Size

    340KB

  • Sample

    241110-zmbfjsxrdk

  • MD5

    23dbc3b5f0464eb6de8465e9c0625f11

  • SHA1

    e85e6f9270b760f91c47d473155e61b6feff8535

  • SHA256

    b5b31a17a79f7a0523e3c49d4b60c0428e46c2105e1a9e004a95c40a75bead28

  • SHA512

    0c4bef0f2d781245cc54f812bdc5321bad3d3ae41fb5474b01583fb71f083e1b63d4d49e36cfd65ffa402b2f77f5ecebf47b9e8983b0db4b71be1d73bfe4ffda

  • SSDEEP

    6144:ApaJfHXvN99N/A67eP2mxHmpDlEPrfk/pu3NlHiFkkFXMsUbulmz:PJHXvNXNh7m2YGpuPrQEzAXF8sUbl

Malware Config

Extracted

Family

redline

Botnet

333

C2

85.235.82.212:54632

Targets

    • Target

      b5b31a17a79f7a0523e3c49d4b60c0428e46c2105e1a9e004a95c40a75bead28

    • Size

      340KB

    • MD5

      23dbc3b5f0464eb6de8465e9c0625f11

    • SHA1

      e85e6f9270b760f91c47d473155e61b6feff8535

    • SHA256

      b5b31a17a79f7a0523e3c49d4b60c0428e46c2105e1a9e004a95c40a75bead28

    • SHA512

      0c4bef0f2d781245cc54f812bdc5321bad3d3ae41fb5474b01583fb71f083e1b63d4d49e36cfd65ffa402b2f77f5ecebf47b9e8983b0db4b71be1d73bfe4ffda

    • SSDEEP

      6144:ApaJfHXvN99N/A67eP2mxHmpDlEPrfk/pu3NlHiFkkFXMsUbulmz:PJHXvNXNh7m2YGpuPrQEzAXF8sUbl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks