General

  • Target

    97cb6f0c2fb4fd697b08da857a12f523bb592a5e8861ada9272ac761aab3d7ef

  • Size

    352KB

  • Sample

    241111-cew1yszdqm

  • MD5

    0daf9b1073d0a2da692cb55e20b9c06f

  • SHA1

    7229a26427693e509d4107fbdf3c6a2470bb0ef8

  • SHA256

    97cb6f0c2fb4fd697b08da857a12f523bb592a5e8861ada9272ac761aab3d7ef

  • SHA512

    7608766021e8ea0889bb567e0feb580f872588b27338345fef317091fca9c5f60fc6c8005a6daa283ad3a7f9e602fb6cd5dd7e73aa638ec709f534c37fcff919

  • SSDEEP

    6144:rwSHBE23NKRgDsqY3vqZXaIAXFul6e2kuluWoqPG33fKvTjQhiomT0iMR:jHBE230RgDsqY3vqkbU6puWwSvTjQmT

Malware Config

Extracted

Family

redline

C2

185.215.113.29:8678

Targets

    • Target

      97cb6f0c2fb4fd697b08da857a12f523bb592a5e8861ada9272ac761aab3d7ef

    • Size

      352KB

    • MD5

      0daf9b1073d0a2da692cb55e20b9c06f

    • SHA1

      7229a26427693e509d4107fbdf3c6a2470bb0ef8

    • SHA256

      97cb6f0c2fb4fd697b08da857a12f523bb592a5e8861ada9272ac761aab3d7ef

    • SHA512

      7608766021e8ea0889bb567e0feb580f872588b27338345fef317091fca9c5f60fc6c8005a6daa283ad3a7f9e602fb6cd5dd7e73aa638ec709f534c37fcff919

    • SSDEEP

      6144:rwSHBE23NKRgDsqY3vqZXaIAXFul6e2kuluWoqPG33fKvTjQhiomT0iMR:jHBE230RgDsqY3vqkbU6puWwSvTjQmT

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks