General

  • Target

    2b2a9b09cd0090c4fbf4123398b95ecef7e7a3c5db78f779e225c4997a4b99de.exe

  • Size

    420KB

  • Sample

    241121-m8mpgs1qaw

  • MD5

    b8de877b2cfd5ec4004ba08389ce0a5f

  • SHA1

    f7ac6b9c3fd426e646d208c42c2aaf0cd7337e4f

  • SHA256

    2b2a9b09cd0090c4fbf4123398b95ecef7e7a3c5db78f779e225c4997a4b99de

  • SHA512

    cf36b6792940367d5da5314aa76004f0e2b8b4b21fb00b7054e4036dcc7c4a6581626dfdd18e04ae6191f69e5154cb315cceeec40e966ece45aea908fc48119d

  • SSDEEP

    12288:6YeeqFP0Ha7g3d0CDwgkOdb2GnECaoSF4n2:6YEFPQdJwvGnECZ2

Malware Config

Extracted

Family

redline

Botnet

18.10

C2

185.215.113.17:9054

Attributes
  • auth_value

    094a20685023e19a7f873eb7c186be8c

Targets

    • Target

      2b2a9b09cd0090c4fbf4123398b95ecef7e7a3c5db78f779e225c4997a4b99de.exe

    • Size

      420KB

    • MD5

      b8de877b2cfd5ec4004ba08389ce0a5f

    • SHA1

      f7ac6b9c3fd426e646d208c42c2aaf0cd7337e4f

    • SHA256

      2b2a9b09cd0090c4fbf4123398b95ecef7e7a3c5db78f779e225c4997a4b99de

    • SHA512

      cf36b6792940367d5da5314aa76004f0e2b8b4b21fb00b7054e4036dcc7c4a6581626dfdd18e04ae6191f69e5154cb315cceeec40e966ece45aea908fc48119d

    • SSDEEP

      12288:6YeeqFP0Ha7g3d0CDwgkOdb2GnECaoSF4n2:6YEFPQdJwvGnECZ2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks