General

  • Target

    2e13c8c9e4a104979088371bad9af9d6f43452989742ea0626829ca16ac1fb4b

  • Size

    467KB

  • Sample

    241111-lblv9axeqh

  • MD5

    0ce9f1a65b99498d52fb4fb21ab0f5b4

  • SHA1

    607b06fda147a8afd659b0d7f900c4820f3200be

  • SHA256

    2e13c8c9e4a104979088371bad9af9d6f43452989742ea0626829ca16ac1fb4b

  • SHA512

    f73967ede62d65950006e6902de8dbe525d920a2ee584ed4e05eb08dfa3b30b2f9d89ae595f0124064b051520cacd20607ddb51d81413ff3cc5cd2f4653dddc9

  • SSDEEP

    12288:2aIUdZ7Xsa75qVWWfCPzJVATm53/ugpqwQJI1zncqWv/nkGFt:DRPoc52Ouy3/9pqEXW3fFt

Malware Config

Extracted

Family

redline

Botnet

BTC1

C2

45.138.157.149:21502

Targets

    • Target

      78401f1b4780b93624c6074650094b2bbc4f0422da436aaf64663ce5e49b8570.exe

    • Size

      823KB

    • MD5

      a6891bebbf4a7856b63d029813309676

    • SHA1

      2f9cde57a4b59d4eca7d25d314d681ce9d607fbf

    • SHA256

      78401f1b4780b93624c6074650094b2bbc4f0422da436aaf64663ce5e49b8570

    • SHA512

      e685947d2c0168e347854bcb3c6bcaf49cbe245d00181f10efc4d0223471e0a920f40aca005bde474536297e65eeee5d8b8fa654bdbf555543339babfa14e393

    • SSDEEP

      12288:ljpIoLLoS60/K7yh0yAUxiN82gJpBDmL+unhKB2IAbWI96kAK5:ljSoLAyAUxiu2gQthKs1R9XT5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks