General

  • Target

    7208722a67c95dfa768a9c4820a1accd764859775cf81dfc1851d2da8d350a40

  • Size

    248KB

  • Sample

    241111-hy29zawarh

  • MD5

    2c3db2297891e5678678b353df662d5e

  • SHA1

    c44fe31a4832567cf72cfa6fa8a0b10701536aa0

  • SHA256

    7208722a67c95dfa768a9c4820a1accd764859775cf81dfc1851d2da8d350a40

  • SHA512

    f27bcb719addd975567e235a45ce898c4037a29f1b8a0676c35bc2e463b736de38b3974a0d45dd2c3541be013696b545d5d003c7bac740bdf5f519111b73a67d

  • SSDEEP

    3072:N6afyjtmnUQSZ6OT7HuPTBmOIKJf0gVpb9BsdKMRjiBrdof+NxttNo5jmvIwQ9M:LnUQSZ6OTyoOzf0M9byjBKPtMoga

Malware Config

Extracted

Family

redline

C2

185.215.113.29:8678

Targets

    • Target

      7208722a67c95dfa768a9c4820a1accd764859775cf81dfc1851d2da8d350a40

    • Size

      248KB

    • MD5

      2c3db2297891e5678678b353df662d5e

    • SHA1

      c44fe31a4832567cf72cfa6fa8a0b10701536aa0

    • SHA256

      7208722a67c95dfa768a9c4820a1accd764859775cf81dfc1851d2da8d350a40

    • SHA512

      f27bcb719addd975567e235a45ce898c4037a29f1b8a0676c35bc2e463b736de38b3974a0d45dd2c3541be013696b545d5d003c7bac740bdf5f519111b73a67d

    • SSDEEP

      3072:N6afyjtmnUQSZ6OT7HuPTBmOIKJf0gVpb9BsdKMRjiBrdof+NxttNo5jmvIwQ9M:LnUQSZ6OTyoOzf0M9byjBKPtMoga

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks