General

  • Target

    32acb5dbeefb865f0bf047e6b192cbf4f37f06203aa5de4a7d37dc714129d012

  • Size

    43KB

  • Sample

    241111-eyjwvasjfz

  • MD5

    a0ee61d12e101dda898f4f326279095f

  • SHA1

    f3f9a97e001e69113c8f8ce7015265e7e469830c

  • SHA256

    32acb5dbeefb865f0bf047e6b192cbf4f37f06203aa5de4a7d37dc714129d012

  • SHA512

    bfa0fb51db730b152f1a69bd05f04a97da89b3818ea2689a292788fcc66fb3a492a79aa6f5f65fe0af00a7b5ad19f281b340318bc41cf36383a28a7757aca400

  • SSDEEP

    768:6z3JsF6beylIHHYkEhrvO1/CQG7mKbdPg8JmZ5m/mwjYaQQBlFOtqI54NM8Fl0xw:6z5s6btkHjEhy9GVY84ZwOYYarBDgqYy

Malware Config

Extracted

Family

redline

Botnet

HİLE_AKTİF

C2

185.176.93.30:8417

Targets

    • Target

      b866a07c5d23b3238de1750b26ea17eb016993864ceb9c93c9283a2d58dfdcab.exe

    • Size

      95KB

    • MD5

      2db823792e011f5fdaf73cf940c116c1

    • SHA1

      ee551603865b7cf071a3302bfea3385d61f03648

    • SHA256

      b866a07c5d23b3238de1750b26ea17eb016993864ceb9c93c9283a2d58dfdcab

    • SHA512

      d971dfcffbe038ed6d1b49311f9c3cc19664a430eca6a892a6146abc020bb5854961d479e7768bb3b5e85895da9baa5ac06209ce5e7cca87ab1ece7b71be8dd6

    • SSDEEP

      1536:aqsIwqR7lbG6jejoigIL43Ywzi0Zb78ivombfexv0ujXyyed28teulgS6pw:IJmRYL+zi0ZbYe1g0ujyzdkw

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks