General

  • Target

    da55eca7312d7a5d92c5d0ae37558942b4f51a8b306c97f70cabb66185da56b0

  • Size

    41KB

  • Sample

    241111-alezxaydle

  • MD5

    1701637367638afb2e1b2fb00e60010f

  • SHA1

    722bd93bd1376c3b6cfaf65ab2e44c8577233eb6

  • SHA256

    da55eca7312d7a5d92c5d0ae37558942b4f51a8b306c97f70cabb66185da56b0

  • SHA512

    495f181d5d8948f4d07fd8bb39689b42b593d834c5b6816d76bd1bdf1b5c8ad634692434cd352f5c7338e8e2d85edd20974c2bd83c5d612ad9a3c6fab6d83c17

  • SSDEEP

    768:DG8bWb2j2IZu8+jqN4VVAyJOPvRsqq511tWsJ2qfehFaq:DG8N2unsqN4PrJwJsqA1P3gFx

Malware Config

Extracted

Family

redline

Botnet

@ownsunrise

C2

103.246.146.46:38192

Targets

    • Target

      b5487c6fee0d0231269dee63f8de962bd541034f7b267df6f21b361296a87007

    • Size

      96KB

    • MD5

      1c44d9edae24b82a45b8dd96560382d1

    • SHA1

      3eaa4d6a5769d4fd4969cc8560533cf6504cf176

    • SHA256

      b5487c6fee0d0231269dee63f8de962bd541034f7b267df6f21b361296a87007

    • SHA512

      294790575f08c349a2b0af3d10a07383d186a4ef648918a90e1455b7fc76e1026b4ab03c37bb54cd06ff6c781eb4b2dffe73606dbdd9e5c9f331ee299d404509

    • SSDEEP

      1536:BcdIy9hNdaetRJCNEtju/Gb4p+3KHbPyFXdE23sKx/SEKG6aP:BcWsh6WjCNADKHTyRddFD

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks