General

  • Target

    829cb13654c9fd806cc709a93e8a4de447caa14c8b7590285ca2855c63be05a9

  • Size

    358KB

  • Sample

    241111-dns64avmcp

  • MD5

    68ef1e9ad038923934928b4f97b9ca59

  • SHA1

    8e0070c8f230cf9d812f08b632556dfbec33dbb2

  • SHA256

    829cb13654c9fd806cc709a93e8a4de447caa14c8b7590285ca2855c63be05a9

  • SHA512

    5a34bf61f8927bedeaf3c1e35c4b55f4172d0fd306731fd0cb60f3d3ba41a5c5cdd440abfdcc47b8b27a4c72f356c960b63669a209fbc5a92f45e933fdaab201

  • SSDEEP

    6144:4KDAAcQEbU3G7O/hCT2/NzJbSMdeq+0TVr+:4KDAAcQEb77OphJJbjMjmr

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.20:13441

Targets

    • Target

      829cb13654c9fd806cc709a93e8a4de447caa14c8b7590285ca2855c63be05a9

    • Size

      358KB

    • MD5

      68ef1e9ad038923934928b4f97b9ca59

    • SHA1

      8e0070c8f230cf9d812f08b632556dfbec33dbb2

    • SHA256

      829cb13654c9fd806cc709a93e8a4de447caa14c8b7590285ca2855c63be05a9

    • SHA512

      5a34bf61f8927bedeaf3c1e35c4b55f4172d0fd306731fd0cb60f3d3ba41a5c5cdd440abfdcc47b8b27a4c72f356c960b63669a209fbc5a92f45e933fdaab201

    • SSDEEP

      6144:4KDAAcQEbU3G7O/hCT2/NzJbSMdeq+0TVr+:4KDAAcQEb77OphJJbjMjmr

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks