General

  • Target

    4e6a3b8b299597476f2983b3b7ae1dd50ad599018b3b175502f2f2be8649efa8

  • Size

    293KB

  • Sample

    241111-g7zd1axrhl

  • MD5

    1a98996dad3bf0adb7106b44da0a1257

  • SHA1

    3f258bc2f4adb27386e76ea6512fdbf10a63d15e

  • SHA256

    4e6a3b8b299597476f2983b3b7ae1dd50ad599018b3b175502f2f2be8649efa8

  • SHA512

    e2048daf22e4c29c54d09570e06718b450f4aaff552abeaddacad6e6d84450b62e06931fe0d0d2a04d956a291313d56709440c9d45d8912fefe0027c010fbc97

  • SSDEEP

    6144:rmdLCq4w8XgVUx14z31eqkaeu1oFhTMiigz5JHscxQhy:wL+w7UK3e5u1cYie+

Malware Config

Extracted

Family

redline

Botnet

PUB

C2

45.9.20.20:13441

Targets

    • Target

      4e6a3b8b299597476f2983b3b7ae1dd50ad599018b3b175502f2f2be8649efa8

    • Size

      293KB

    • MD5

      1a98996dad3bf0adb7106b44da0a1257

    • SHA1

      3f258bc2f4adb27386e76ea6512fdbf10a63d15e

    • SHA256

      4e6a3b8b299597476f2983b3b7ae1dd50ad599018b3b175502f2f2be8649efa8

    • SHA512

      e2048daf22e4c29c54d09570e06718b450f4aaff552abeaddacad6e6d84450b62e06931fe0d0d2a04d956a291313d56709440c9d45d8912fefe0027c010fbc97

    • SSDEEP

      6144:rmdLCq4w8XgVUx14z31eqkaeu1oFhTMiigz5JHscxQhy:wL+w7UK3e5u1cYie+

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks