General

  • Target

    34ea7434bf039e7502960502da49c28e9ca2283efae0e7ea661391e0b295e449.exe

  • Size

    171KB

  • Sample

    241122-jb7rlswpev

  • MD5

    3358e0007df17d15f1fc253b68f238f8

  • SHA1

    b5d79461ef215f06c2e84ed37ad125ae733220bd

  • SHA256

    34ea7434bf039e7502960502da49c28e9ca2283efae0e7ea661391e0b295e449

  • SHA512

    14b8ad889d6aac08fea45997c53ddbceca6e39039c0a2640e2de424d51c38436af9a90a8c6dae7f3f6e05aaf91e6d9bff33dcc4b72838f66f0616215ea42958b

  • SSDEEP

    3072:BGolBCNQw7F/drLh7hSWqqwkGzhtbAhiLgYS:MoSNQwR/J1phwXzDEiA

Malware Config

Extracted

Family

redline

C2

94.26.249.88:21638

Attributes
  • auth_value

    ad39d6a8ea7823f2a92f57ebaa4c98a5

Targets

    • Target

      34ea7434bf039e7502960502da49c28e9ca2283efae0e7ea661391e0b295e449.exe

    • Size

      171KB

    • MD5

      3358e0007df17d15f1fc253b68f238f8

    • SHA1

      b5d79461ef215f06c2e84ed37ad125ae733220bd

    • SHA256

      34ea7434bf039e7502960502da49c28e9ca2283efae0e7ea661391e0b295e449

    • SHA512

      14b8ad889d6aac08fea45997c53ddbceca6e39039c0a2640e2de424d51c38436af9a90a8c6dae7f3f6e05aaf91e6d9bff33dcc4b72838f66f0616215ea42958b

    • SSDEEP

      3072:BGolBCNQw7F/drLh7hSWqqwkGzhtbAhiLgYS:MoSNQwR/J1phwXzDEiA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks