General

  • Target

    f7be904ebfc1b462376301fecf7ab924c99f6e5d7f7182377d1047e2282118a3.exe

  • Size

    843KB

  • Sample

    241123-zndmasskgp

  • MD5

    dc35d8a4cf8ea85c6939fb3bfcab9794

  • SHA1

    69539b74a74dab64edc36f5449b157e9521f1a48

  • SHA256

    f7be904ebfc1b462376301fecf7ab924c99f6e5d7f7182377d1047e2282118a3

  • SHA512

    4e55b11a346e23bd4bd19eed84208831ad7fe4a1280343bc6360eca6e8e00531ae6a5802721e86d148a37b132e70ea1852138b30760c70159a2f09a854f5fdc8

  • SSDEEP

    12288:pgDF7wJsMfW3gp6S3Gnk9dZhjGD/VUIFgGoImAoblPAKaeHZI3si07Bi8/T4D6dx:0Ys2qgpX3R3q/VTuZRPd5WtaCUx

Malware Config

Extracted

Family

redline

Botnet

@Lumexyy

C2

145.239.32.179:27763

Attributes
  • auth_value

    6e134fbe11e1fba7052c029b94245b55

Targets

    • Target

      f7be904ebfc1b462376301fecf7ab924c99f6e5d7f7182377d1047e2282118a3.exe

    • Size

      843KB

    • MD5

      dc35d8a4cf8ea85c6939fb3bfcab9794

    • SHA1

      69539b74a74dab64edc36f5449b157e9521f1a48

    • SHA256

      f7be904ebfc1b462376301fecf7ab924c99f6e5d7f7182377d1047e2282118a3

    • SHA512

      4e55b11a346e23bd4bd19eed84208831ad7fe4a1280343bc6360eca6e8e00531ae6a5802721e86d148a37b132e70ea1852138b30760c70159a2f09a854f5fdc8

    • SSDEEP

      12288:pgDF7wJsMfW3gp6S3Gnk9dZhjGD/VUIFgGoImAoblPAKaeHZI3si07Bi8/T4D6dx:0Ys2qgpX3R3q/VTuZRPd5WtaCUx

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks