General

  • Target

    f1e7ab79a5959e52998afbe6b187b017b510e970a58b59a451f7a4c94c990c01.exe

  • Size

    529KB

  • Sample

    241129-r2txfa1key

  • MD5

    de2e6197e4b2e7872413ca2f3d40d8c9

  • SHA1

    04335cef94d2f59b9a0a7bf6c951adba3fe6a4d6

  • SHA256

    f1e7ab79a5959e52998afbe6b187b017b510e970a58b59a451f7a4c94c990c01

  • SHA512

    5077832de0416b79174640d6b5e377409871f8987435972d1c95cc91c7e9a7e9dcc5469261925bb4ac0dc3f4e42e7a5c068f65d1a6bfd43c854cee876f51b7de

  • SSDEEP

    3072:xYD4sTC3kjkgSZ5LmDVen+VoWV1S4C7/hOE1Zz2ckcrjh44KRi2gtcv5b/7H:xYD4F3k5SZgVenKx11C1OE3t1tc5b/j

Malware Config

Extracted

Family

redline

C2

141.94.188.138:46419

Attributes
  • auth_value

    3f48b95855158031ae9e7dafcb203009

Targets

    • Target

      f1e7ab79a5959e52998afbe6b187b017b510e970a58b59a451f7a4c94c990c01.exe

    • Size

      529KB

    • MD5

      de2e6197e4b2e7872413ca2f3d40d8c9

    • SHA1

      04335cef94d2f59b9a0a7bf6c951adba3fe6a4d6

    • SHA256

      f1e7ab79a5959e52998afbe6b187b017b510e970a58b59a451f7a4c94c990c01

    • SHA512

      5077832de0416b79174640d6b5e377409871f8987435972d1c95cc91c7e9a7e9dcc5469261925bb4ac0dc3f4e42e7a5c068f65d1a6bfd43c854cee876f51b7de

    • SSDEEP

      3072:xYD4sTC3kjkgSZ5LmDVen+VoWV1S4C7/hOE1Zz2ckcrjh44KRi2gtcv5b/7H:xYD4F3k5SZgVenKx11C1OE3t1tc5b/j

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks