General

  • Target

    c5d080e3ffc6029dd77e1e61ea9f7bbbcc7c335becc48326ee23ebd2782c9f4a

  • Size

    395KB

  • Sample

    241111-eae8ravrdl

  • MD5

    174f5e167da35b8d66fb9532069c8255

  • SHA1

    0543f3522e61ed50213c9a69a887226b09609940

  • SHA256

    c5d080e3ffc6029dd77e1e61ea9f7bbbcc7c335becc48326ee23ebd2782c9f4a

  • SHA512

    bf9da68a060d12a9729b47c629c9e9a84b0a9b2f2bacb6e14799424803f035f11a1807e0fd5f517de98e8043771e12ae663cca1fb71d49948985db8c4f25c122

  • SSDEEP

    6144:S8J7ui3GtK/v/Ypw1G0uuYx+uu+OGI1XwYpqqWXgi474+agTDmm4CFyQ:XC0GY/vKw1JFvrGqfpqqWXgPNbfwQ

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      c5d080e3ffc6029dd77e1e61ea9f7bbbcc7c335becc48326ee23ebd2782c9f4a

    • Size

      395KB

    • MD5

      174f5e167da35b8d66fb9532069c8255

    • SHA1

      0543f3522e61ed50213c9a69a887226b09609940

    • SHA256

      c5d080e3ffc6029dd77e1e61ea9f7bbbcc7c335becc48326ee23ebd2782c9f4a

    • SHA512

      bf9da68a060d12a9729b47c629c9e9a84b0a9b2f2bacb6e14799424803f035f11a1807e0fd5f517de98e8043771e12ae663cca1fb71d49948985db8c4f25c122

    • SSDEEP

      6144:S8J7ui3GtK/v/Ypw1G0uuYx+uu+OGI1XwYpqqWXgi474+agTDmm4CFyQ:XC0GY/vKw1JFvrGqfpqqWXgPNbfwQ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks