General

  • Target

    c6a4d7bf9fbfa65e5160b9a6c59407686e1c53f587baf899ba5802fe9833ad24

  • Size

    107KB

  • Sample

    241111-aeeqkaxmdt

  • MD5

    0bb33a634c650e4d77e255714fbf687a

  • SHA1

    95248be4fb9a0f38db65575028c8b72ea52f73be

  • SHA256

    c6a4d7bf9fbfa65e5160b9a6c59407686e1c53f587baf899ba5802fe9833ad24

  • SHA512

    78a62e10dddc00ce8bd54486868134138256af1ae2df60e3ba1ea352e1d61121abbd5755618c79fac446db450a78a5d8a5d5dc096ea29389c46f62a113e1209e

  • SSDEEP

    1536:jxPQV7sKf+QX9PAn3y2pAuuuuwer9kjbuFGdMnLPyELTdMVbWOE8G6eRaoigt:tgsKmQXZw3hpE5exMnLysdMgJv9

Malware Config

Extracted

Family

redline

Botnet

@mqawe

C2

91.142.79.218:45663

Targets

    • Target

      c6a4d7bf9fbfa65e5160b9a6c59407686e1c53f587baf899ba5802fe9833ad24

    • Size

      107KB

    • MD5

      0bb33a634c650e4d77e255714fbf687a

    • SHA1

      95248be4fb9a0f38db65575028c8b72ea52f73be

    • SHA256

      c6a4d7bf9fbfa65e5160b9a6c59407686e1c53f587baf899ba5802fe9833ad24

    • SHA512

      78a62e10dddc00ce8bd54486868134138256af1ae2df60e3ba1ea352e1d61121abbd5755618c79fac446db450a78a5d8a5d5dc096ea29389c46f62a113e1209e

    • SSDEEP

      1536:jxPQV7sKf+QX9PAn3y2pAuuuuwer9kjbuFGdMnLPyELTdMVbWOE8G6eRaoigt:tgsKmQXZw3hpE5exMnLysdMgJv9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks