General

  • Target

    0041b5be116fe3277d3e948abf6d1e3586111494b6876ec5967bef9a361548fd.exe

  • Size

    4.7MB

  • Sample

    241123-g8fchszpgw

  • MD5

    352609e910eceb63157f62ac2971e771

  • SHA1

    a622d3abdf7fa9cb9b53ee9024671eaa9dc66962

  • SHA256

    0041b5be116fe3277d3e948abf6d1e3586111494b6876ec5967bef9a361548fd

  • SHA512

    0d2e2bf704782eb10421797af1af6a6d692178aa8a3878204a60a928486fe67e6b47461d4153da9fd99780a2d3dd4370c19c075b2568e78542a6f360d3825ac6

  • SSDEEP

    98304:YLoijyYrL08xAYL2OR3xKIkOCC7rmn81xI3yJXSFw2gTV+tTS9IC6B2H:pnYn7AGRBsC7rH1xrXutuSJBc

Malware Config

Extracted

Family

redline

Botnet

@alexsandrovnaaaaaa

C2

ananasalit.xyz:81

Attributes
  • auth_value

    55d48a1a930cf4d6f3e2d6bcd0daaf07

Targets

    • Target

      0041b5be116fe3277d3e948abf6d1e3586111494b6876ec5967bef9a361548fd.exe

    • Size

      4.7MB

    • MD5

      352609e910eceb63157f62ac2971e771

    • SHA1

      a622d3abdf7fa9cb9b53ee9024671eaa9dc66962

    • SHA256

      0041b5be116fe3277d3e948abf6d1e3586111494b6876ec5967bef9a361548fd

    • SHA512

      0d2e2bf704782eb10421797af1af6a6d692178aa8a3878204a60a928486fe67e6b47461d4153da9fd99780a2d3dd4370c19c075b2568e78542a6f360d3825ac6

    • SSDEEP

      98304:YLoijyYrL08xAYL2OR3xKIkOCC7rmn81xI3yJXSFw2gTV+tTS9IC6B2H:pnYn7AGRBsC7rH1xrXutuSJBc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks