General

  • Target

    08ecaa3dd477f58b3553a59f5cbd85f04c57d9efa121e1bbdb7ea735b21965ffN.exe

  • Size

    494KB

  • Sample

    241122-m817wazjdv

  • MD5

    e0966a5691ecade17b153c3e44905330

  • SHA1

    f801747bdb76493daf611373d70224ae82f03578

  • SHA256

    08ecaa3dd477f58b3553a59f5cbd85f04c57d9efa121e1bbdb7ea735b21965ff

  • SHA512

    48a82dca451e7e906f6bd46780aed8b67693247f6f05f19f2960a96ff646ad405a13a9a69d8e3b76056b2a476bfcc8abc06ede928454c9c93562ca4baffef7df

  • SSDEEP

    12288:p3dg/s0yxvWzVWbBW4eAMFbH7narG/6wrs/s1rTzpVDNu894ku:HgsGVWbB7Ct72C6wrsCrDk892

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.137.22.126:55615

Targets

    • Target

      08ecaa3dd477f58b3553a59f5cbd85f04c57d9efa121e1bbdb7ea735b21965ffN.exe

    • Size

      494KB

    • MD5

      e0966a5691ecade17b153c3e44905330

    • SHA1

      f801747bdb76493daf611373d70224ae82f03578

    • SHA256

      08ecaa3dd477f58b3553a59f5cbd85f04c57d9efa121e1bbdb7ea735b21965ff

    • SHA512

      48a82dca451e7e906f6bd46780aed8b67693247f6f05f19f2960a96ff646ad405a13a9a69d8e3b76056b2a476bfcc8abc06ede928454c9c93562ca4baffef7df

    • SSDEEP

      12288:p3dg/s0yxvWzVWbBW4eAMFbH7narG/6wrs/s1rTzpVDNu894ku:HgsGVWbB7Ct72C6wrsCrDk892

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks