General

  • Target

    e714191b09b73788cd84915452326a48c12bc976d68c131ebdfe08a270fecd2c

  • Size

    359KB

  • Sample

    241111-mzy16ayclk

  • MD5

    a2f79b9b2d2fac123315a19c46e4cf15

  • SHA1

    f9d9c55254f73d097de905097dd3c50b97f68ea7

  • SHA256

    e714191b09b73788cd84915452326a48c12bc976d68c131ebdfe08a270fecd2c

  • SHA512

    cbfbc114c9c26b6bcc10604b255b4579799829219bd35914a9c81db44af287b21a1c1d266a4983d711391661c9e3413994d379d823a477ce6306e9ec8ed7f5e3

  • SSDEEP

    6144:F9tA9DNa1/kB7RQGQicXl9kHVgeBAoQOtMWhZA8hH:F9tA9DM1/+RuREWeBAdK33VhH

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.20:13441

Targets

    • Target

      e714191b09b73788cd84915452326a48c12bc976d68c131ebdfe08a270fecd2c

    • Size

      359KB

    • MD5

      a2f79b9b2d2fac123315a19c46e4cf15

    • SHA1

      f9d9c55254f73d097de905097dd3c50b97f68ea7

    • SHA256

      e714191b09b73788cd84915452326a48c12bc976d68c131ebdfe08a270fecd2c

    • SHA512

      cbfbc114c9c26b6bcc10604b255b4579799829219bd35914a9c81db44af287b21a1c1d266a4983d711391661c9e3413994d379d823a477ce6306e9ec8ed7f5e3

    • SSDEEP

      6144:F9tA9DNa1/kB7RQGQicXl9kHVgeBAoQOtMWhZA8hH:F9tA9DM1/+RuREWeBAdK33VhH

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks