General

  • Target

    4ab66fe4d4da4a14a28a3d2bc3a525cee18fc6a39176332817b3ea43f0beb9f4.exe

  • Size

    157KB

  • Sample

    241123-ktezzsskax

  • MD5

    b5af483aba699bdc47d8a16fb9bb445e

  • SHA1

    9bb3df0fb4cd4444bae37905ee935e0f2b86b849

  • SHA256

    4ab66fe4d4da4a14a28a3d2bc3a525cee18fc6a39176332817b3ea43f0beb9f4

  • SHA512

    a03cbc530f8bf253e86f3204497bf5716f9f1241112ff42997b1cd6c1d61b785f0480e26e52054f1aad5e9a48be6e224d3b30f100c5ad1739363fb7d5e16248c

  • SSDEEP

    3072:v6qHUrQdS8G8B+JfNUfDnZZC4aSOHiE3pxce:iq0t83CUfDZkp

Malware Config

Extracted

Family

redline

C2

141.94.188.138:46419

Attributes
  • auth_value

    3f48b95855158031ae9e7dafcb203009

Targets

    • Target

      4ab66fe4d4da4a14a28a3d2bc3a525cee18fc6a39176332817b3ea43f0beb9f4.exe

    • Size

      157KB

    • MD5

      b5af483aba699bdc47d8a16fb9bb445e

    • SHA1

      9bb3df0fb4cd4444bae37905ee935e0f2b86b849

    • SHA256

      4ab66fe4d4da4a14a28a3d2bc3a525cee18fc6a39176332817b3ea43f0beb9f4

    • SHA512

      a03cbc530f8bf253e86f3204497bf5716f9f1241112ff42997b1cd6c1d61b785f0480e26e52054f1aad5e9a48be6e224d3b30f100c5ad1739363fb7d5e16248c

    • SSDEEP

      3072:v6qHUrQdS8G8B+JfNUfDnZZC4aSOHiE3pxce:iq0t83CUfDZkp

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks