General

  • Target

    ad9fd648effcac663cd54b3cff028100fd4dfe8957c2f29e618f2230ce89cfd6

  • Size

    317KB

  • Sample

    241111-d51mhasdnd

  • MD5

    4b5ecf976fa82d6d199c024e1285a88d

  • SHA1

    a3bf5f3064e35899fce74ab939b773fa9c70729e

  • SHA256

    ad9fd648effcac663cd54b3cff028100fd4dfe8957c2f29e618f2230ce89cfd6

  • SHA512

    51c9bb5eae2b1b3caa166e788393494d604b9fe757ec94c2c2b4a7af9ef0ddf2368bd3938f98bb5c1a2461bc889105293715162fde4684eeb9d686758ee1d165

  • SSDEEP

    6144:rFZQYXOnCP6uROo07HwlySq3x0Ztz07PTvYrowtnV62pXMZ0N:hZ7P6uROhwlTSmZtz07Pc8EJv

Malware Config

Extracted

Family

redline

Botnet

PUB

C2

45.9.20.20:13441

Targets

    • Target

      ad9fd648effcac663cd54b3cff028100fd4dfe8957c2f29e618f2230ce89cfd6

    • Size

      317KB

    • MD5

      4b5ecf976fa82d6d199c024e1285a88d

    • SHA1

      a3bf5f3064e35899fce74ab939b773fa9c70729e

    • SHA256

      ad9fd648effcac663cd54b3cff028100fd4dfe8957c2f29e618f2230ce89cfd6

    • SHA512

      51c9bb5eae2b1b3caa166e788393494d604b9fe757ec94c2c2b4a7af9ef0ddf2368bd3938f98bb5c1a2461bc889105293715162fde4684eeb9d686758ee1d165

    • SSDEEP

      6144:rFZQYXOnCP6uROo07HwlySq3x0Ztz07PTvYrowtnV62pXMZ0N:hZ7P6uROhwlTSmZtz07Pc8EJv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks