General

  • Target

    37d6779a9f5497dfabe7ebf28a664782

  • Size

    475KB

  • Sample

    241111-e11x5sskbz

  • MD5

    37d6779a9f5497dfabe7ebf28a664782

  • SHA1

    79114b3798da20f8d87e434df9a8fdac186f2821

  • SHA256

    8bd30d9db60710b3a25e5669f34c04fbbeea35c8bb6b32e4b902561f32531bba

  • SHA512

    65ff2169ca7710f705d5cc1d01a3ae4d444578a18a36838972a9fa000f7aee1ee7d380f1c1263c4667db3c84fd33faad586dc0580376fd97f75bbaf144aa568d

  • SSDEEP

    12288:L2LMC0sGJMKdmkPSoR8/+GkP4t8jElyQ6qYlVEic2Y:yLD0skMKcwoSDElyOoJcN

Malware Config

Extracted

Family

redline

Botnet

bk

C2

212.192.246.222:11418

Targets

    • Target

      RFQ- MACHINE QUOTATION.exe

    • Size

      718KB

    • MD5

      b078b3a0f8c96dc283dcab3c105e8014

    • SHA1

      89c96c2bd5dc00dc669ec0fe2314f9ffc10e59ae

    • SHA256

      b537c8eed901d467529d86caa647489a7b0d168c8a151caad2fb75bea4d99a4f

    • SHA512

      e5fd6f1b63dbc16b25f565463826facfd043add64d99cfb52da0f2518de08c5883e9f31afe1164f3e3c5aa7f7016fb29e273a9e36a65c21008b3c9ffcc2b236d

    • SSDEEP

      12288:RXm7z5SH0A6I6gZi/HM3XqyhQqfsNkaKiWhuhCH:sz1A6k0/HMbhQvNkarWh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks