General

  • Target

    fe2c4d86c499a4efa9f12d5348bd5b3c5c6293bf68fad9d8cfb2af9a7c62f59f

  • Size

    98KB

  • Sample

    241111-dea9xs1gmd

  • MD5

    0e49788346286b3e66bd825dce7aec43

  • SHA1

    20d6613a543383d3fb9026d32a96c5a7230becca

  • SHA256

    fe2c4d86c499a4efa9f12d5348bd5b3c5c6293bf68fad9d8cfb2af9a7c62f59f

  • SHA512

    8ce370608b87530678578b12702b0938ce963d4b51f58a9cf274e29ca43741d9f5bd7402787f07e97608affce4f907534017e958f5a5f1b58f9686636b4d6473

  • SSDEEP

    1536:m3LNmocO8oXzr2coehFb0a9JFSafLsmbfeFvvuvUyyedgd3HqCxXsEGG6ijoigt:mxmoc9edJI6LhUvucyzdBSnS

Malware Config

Extracted

Family

redline

Botnet

@Caduian

C2

185.250.206.82:21330

Targets

    • Target

      fe2c4d86c499a4efa9f12d5348bd5b3c5c6293bf68fad9d8cfb2af9a7c62f59f

    • Size

      98KB

    • MD5

      0e49788346286b3e66bd825dce7aec43

    • SHA1

      20d6613a543383d3fb9026d32a96c5a7230becca

    • SHA256

      fe2c4d86c499a4efa9f12d5348bd5b3c5c6293bf68fad9d8cfb2af9a7c62f59f

    • SHA512

      8ce370608b87530678578b12702b0938ce963d4b51f58a9cf274e29ca43741d9f5bd7402787f07e97608affce4f907534017e958f5a5f1b58f9686636b4d6473

    • SSDEEP

      1536:m3LNmocO8oXzr2coehFb0a9JFSafLsmbfeFvvuvUyyedgd3HqCxXsEGG6ijoigt:mxmoc9edJI6LhUvucyzdBSnS

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks