General

  • Target

    63934d81a2b00c4231533d27341a1e3436536e3662cfe6587abd343dff853c1d

  • Size

    271KB

  • Sample

    241111-f5bdqaxlgj

  • MD5

    f68c9a22559dc8d7cdf11ef0a6cd871d

  • SHA1

    3c5de01d1302d8c32f830bb9cf2a87590aa9d547

  • SHA256

    63934d81a2b00c4231533d27341a1e3436536e3662cfe6587abd343dff853c1d

  • SHA512

    3b210200185a9ec20fb853e686242c084bd2195f7b0bb6fcfe8e788979c058d79b94c3f2f758948f02f3d73ea5eb370da5f8afeb980c7d34ded60d89b1116aa4

  • SSDEEP

    6144:7w97LrYbc1yiHjQXjafYEziMQi56cMs9/Iyf140nq6CLayYazldL:M974bcQvW+cDJISS0q6Cua5

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      63934d81a2b00c4231533d27341a1e3436536e3662cfe6587abd343dff853c1d

    • Size

      271KB

    • MD5

      f68c9a22559dc8d7cdf11ef0a6cd871d

    • SHA1

      3c5de01d1302d8c32f830bb9cf2a87590aa9d547

    • SHA256

      63934d81a2b00c4231533d27341a1e3436536e3662cfe6587abd343dff853c1d

    • SHA512

      3b210200185a9ec20fb853e686242c084bd2195f7b0bb6fcfe8e788979c058d79b94c3f2f758948f02f3d73ea5eb370da5f8afeb980c7d34ded60d89b1116aa4

    • SSDEEP

      6144:7w97LrYbc1yiHjQXjafYEziMQi56cMs9/Iyf140nq6CLayYazldL:M974bcQvW+cDJISS0q6Cua5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks