General

  • Target

    34c5dcbb3642bd80abdcee628f2acb35c2110870aabb03dbcf0c47a58dce9e4f.exe

  • Size

    419KB

  • Sample

    241123-dllz1asqfq

  • MD5

    953ec98d5723939736180b6cf0b8e945

  • SHA1

    2d0357e46b918a8d10f3ba258ef2a9debd4519ff

  • SHA256

    34c5dcbb3642bd80abdcee628f2acb35c2110870aabb03dbcf0c47a58dce9e4f

  • SHA512

    696d72abebbeceaafbf3a7e5a21c1d6ccfab15eae77e211e2cf6c2e5de85e1f1861913d9045b7afb13cc38ae5fd1539b3ca486c20f2e035acbed994f2477e59f

  • SSDEEP

    12288:syd11NNx2Z3CYNsis2kACDxa/sg5uwGd36+JxDI29El8x:sOxK3CLNw0+uz6+XDa8x

Malware Config

Extracted

Family

redline

Botnet

PUB

C2

45.9.20.182:52236

Attributes
  • auth_value

    a272f3a2850ec3dccdaed97234b7c40e

Targets

    • Target

      34c5dcbb3642bd80abdcee628f2acb35c2110870aabb03dbcf0c47a58dce9e4f.exe

    • Size

      419KB

    • MD5

      953ec98d5723939736180b6cf0b8e945

    • SHA1

      2d0357e46b918a8d10f3ba258ef2a9debd4519ff

    • SHA256

      34c5dcbb3642bd80abdcee628f2acb35c2110870aabb03dbcf0c47a58dce9e4f

    • SHA512

      696d72abebbeceaafbf3a7e5a21c1d6ccfab15eae77e211e2cf6c2e5de85e1f1861913d9045b7afb13cc38ae5fd1539b3ca486c20f2e035acbed994f2477e59f

    • SSDEEP

      12288:syd11NNx2Z3CYNsis2kACDxa/sg5uwGd36+JxDI29El8x:sOxK3CLNw0+uz6+XDa8x

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks