General

  • Target

    1effa8d05a3c2c4ab18b028595a886beb1311f50311228292f9546d0d73a5a64.exe

  • Size

    768KB

  • Sample

    241122-qryxzaxmel

  • MD5

    9cc7e3f594de7fbe392b1ab4590f7a30

  • SHA1

    7985bf11bd532322134f15524779c2ab97fb99dd

  • SHA256

    1effa8d05a3c2c4ab18b028595a886beb1311f50311228292f9546d0d73a5a64

  • SHA512

    42abdb32eabcee0b7ea76a367a0bf005e21b26b7c1c03d02c7f7f7bc55d4a2ea5a31e9e61b757d3cafd7e76a26dc3163458f7638f094fcfa1b5e0a12618fe970

  • SSDEEP

    12288:1paoy89TKFdcgviDi01Of+xLsdG2pjiTxUlJ8LEKShOMyMryAU9XdHTSczcBFkHf:1UzRb7W+hJ0r8yM9wdzSczcBFkHf

Malware Config

Extracted

Family

redline

Botnet

@Durak9876

C2

95.181.152.5:46927

Attributes
  • auth_value

    cdf3919a262c0d6ba99116b375d7551c

Targets

    • Target

      1effa8d05a3c2c4ab18b028595a886beb1311f50311228292f9546d0d73a5a64.exe

    • Size

      768KB

    • MD5

      9cc7e3f594de7fbe392b1ab4590f7a30

    • SHA1

      7985bf11bd532322134f15524779c2ab97fb99dd

    • SHA256

      1effa8d05a3c2c4ab18b028595a886beb1311f50311228292f9546d0d73a5a64

    • SHA512

      42abdb32eabcee0b7ea76a367a0bf005e21b26b7c1c03d02c7f7f7bc55d4a2ea5a31e9e61b757d3cafd7e76a26dc3163458f7638f094fcfa1b5e0a12618fe970

    • SSDEEP

      12288:1paoy89TKFdcgviDi01Of+xLsdG2pjiTxUlJ8LEKShOMyMryAU9XdHTSczcBFkHf:1UzRb7W+hJ0r8yM9wdzSczcBFkHf

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks