General

  • Target

    cacf8029ec776521b4146b82bd315734140af765847eb264d472ad719deeb0bb.exe

  • Size

    337KB

  • Sample

    241123-q22rlsslbm

  • MD5

    d5c171bd67af2e9d635ead287f823cf4

  • SHA1

    040b1deb8c14f155db858b8e58d46666dd070ae0

  • SHA256

    cacf8029ec776521b4146b82bd315734140af765847eb264d472ad719deeb0bb

  • SHA512

    b01bff03749f59f6794ce1c7037d85c3f3dcb84adc63d3e7bda1e7606b95c73034d57562399f414c8997254ac93ea63a6251aa000e6e9f3c999d3db2547eb59b

  • SSDEEP

    6144:4HGHL5BgiSio083GLv8jmS+YFAgJX+bIADG8ell:4mHL7giFod2T8jm10X+bxDW

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.182:52236

Attributes
  • auth_value

    a272f3a2850ec3dccdaed97234b7c40e

Targets

    • Target

      cacf8029ec776521b4146b82bd315734140af765847eb264d472ad719deeb0bb.exe

    • Size

      337KB

    • MD5

      d5c171bd67af2e9d635ead287f823cf4

    • SHA1

      040b1deb8c14f155db858b8e58d46666dd070ae0

    • SHA256

      cacf8029ec776521b4146b82bd315734140af765847eb264d472ad719deeb0bb

    • SHA512

      b01bff03749f59f6794ce1c7037d85c3f3dcb84adc63d3e7bda1e7606b95c73034d57562399f414c8997254ac93ea63a6251aa000e6e9f3c999d3db2547eb59b

    • SSDEEP

      6144:4HGHL5BgiSio083GLv8jmS+YFAgJX+bIADG8ell:4mHL7giFod2T8jm10X+bxDW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks