General

  • Target

    ccd1b91e8c77389b933b283b636cb1d461853f4ce061b8cdc4696c13e4da17a4

  • Size

    249KB

  • Sample

    241111-klc6eswjgx

  • MD5

    7a3ebb2a5180d567db154f9e2fc12a53

  • SHA1

    bfdc272805805f67380b0fe9db75c04c6719ae90

  • SHA256

    ccd1b91e8c77389b933b283b636cb1d461853f4ce061b8cdc4696c13e4da17a4

  • SHA512

    8626f0d259ebc89a2850fe77e8f94612b61e3bd9fcbfd6bd46d23f61630e1724bc942768ea01d46c9ae1c4f53cfa8b3c6257d6cc522000e36f5052c5ab53ad0c

  • SSDEEP

    6144:GnpfA6lp2PAePCt8Jo27jsEa+XLlCmObOsbYg:WpfaPA0Ct82ea+bkC

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      ccd1b91e8c77389b933b283b636cb1d461853f4ce061b8cdc4696c13e4da17a4

    • Size

      249KB

    • MD5

      7a3ebb2a5180d567db154f9e2fc12a53

    • SHA1

      bfdc272805805f67380b0fe9db75c04c6719ae90

    • SHA256

      ccd1b91e8c77389b933b283b636cb1d461853f4ce061b8cdc4696c13e4da17a4

    • SHA512

      8626f0d259ebc89a2850fe77e8f94612b61e3bd9fcbfd6bd46d23f61630e1724bc942768ea01d46c9ae1c4f53cfa8b3c6257d6cc522000e36f5052c5ab53ad0c

    • SSDEEP

      6144:GnpfA6lp2PAePCt8Jo27jsEa+XLlCmObOsbYg:WpfaPA0Ct82ea+bkC

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks