General

  • Target

    0fe725bd750613095e9bc1e9eec8fa6804205d7a5aec00d483a2ec6fa547feac

  • Size

    335KB

  • Sample

    241111-ax825axqdt

  • MD5

    5f0cbbbc92b819788822357b8a613be0

  • SHA1

    1d71cf5e1850f8e16bd152d6431d142f410ecfb1

  • SHA256

    0fe725bd750613095e9bc1e9eec8fa6804205d7a5aec00d483a2ec6fa547feac

  • SHA512

    953895e98bdcb2641715858727978685c9e3d797e8cc6810eb8b4915b7f01e038d3303e2a0f41f3f0d7e27f1129059f0f85f95e06ff3283a0313f1950d222b31

  • SSDEEP

    3072:NVu9BB/QNxfTGtTL2M4zNYvf4jzo0iY4eJ6pWfjVIN73LXMxJlWzqn/5qCh93gZH:TuVQTfKpaVxQAA0iVfLRkOM0I4R

Malware Config

Extracted

Family

redline

Botnet

seat_tight

C2

45.144.29.19:24123

Targets

    • Target

      0fe725bd750613095e9bc1e9eec8fa6804205d7a5aec00d483a2ec6fa547feac

    • Size

      335KB

    • MD5

      5f0cbbbc92b819788822357b8a613be0

    • SHA1

      1d71cf5e1850f8e16bd152d6431d142f410ecfb1

    • SHA256

      0fe725bd750613095e9bc1e9eec8fa6804205d7a5aec00d483a2ec6fa547feac

    • SHA512

      953895e98bdcb2641715858727978685c9e3d797e8cc6810eb8b4915b7f01e038d3303e2a0f41f3f0d7e27f1129059f0f85f95e06ff3283a0313f1950d222b31

    • SSDEEP

      3072:NVu9BB/QNxfTGtTL2M4zNYvf4jzo0iY4eJ6pWfjVIN73LXMxJlWzqn/5qCh93gZH:TuVQTfKpaVxQAA0iVfLRkOM0I4R

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks