General

  • Target

    3b095b6a402a924c50fe0504592ee2af6c7daf0e9ea0f1025ccb5f3bc1ec60a9

  • Size

    95KB

  • Sample

    241111-gkgwfatkfs

  • MD5

    bda77bf36566ab2bc4eea359167b2a38

  • SHA1

    18b84b615e3044d119d68807670a4339788fe2bc

  • SHA256

    3b095b6a402a924c50fe0504592ee2af6c7daf0e9ea0f1025ccb5f3bc1ec60a9

  • SHA512

    a2ab039c95da6840530162d95be4aa12f9accb3dcf0cb85b06d066d763f8903514428d777720cf490b124ba04d3bbabe47527a07880e956f996eb3629d61ee5a

  • SSDEEP

    1536:iqssNqBUlbG6jejoigIk43Ywzi0Zb78ivombfexv0ujXyyed2CtmulgS6p4:AgCMYk+zi0ZbYe1g0ujyzdW4

Malware Config

Extracted

Family

redline

Botnet

niggaballs

C2

program-gifts.at.ply.gg:59438

Targets

    • Target

      3b095b6a402a924c50fe0504592ee2af6c7daf0e9ea0f1025ccb5f3bc1ec60a9

    • Size

      95KB

    • MD5

      bda77bf36566ab2bc4eea359167b2a38

    • SHA1

      18b84b615e3044d119d68807670a4339788fe2bc

    • SHA256

      3b095b6a402a924c50fe0504592ee2af6c7daf0e9ea0f1025ccb5f3bc1ec60a9

    • SHA512

      a2ab039c95da6840530162d95be4aa12f9accb3dcf0cb85b06d066d763f8903514428d777720cf490b124ba04d3bbabe47527a07880e956f996eb3629d61ee5a

    • SSDEEP

      1536:iqssNqBUlbG6jejoigIk43Ywzi0Zb78ivombfexv0ujXyyed2CtmulgS6p4:AgCMYk+zi0ZbYe1g0ujyzdW4

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks