General

  • Target

    64d09f36ee04a36d13b884c892e426109512270a003c3509c33066cf7349c56a

  • Size

    595KB

  • Sample

    241130-n7xczaxpdp

  • MD5

    3b160a3db7b8761984be21ae2f936ab2

  • SHA1

    41bb93bd501c3d5ad76de80a8514abc9dc669496

  • SHA256

    64d09f36ee04a36d13b884c892e426109512270a003c3509c33066cf7349c56a

  • SHA512

    f36327946f917d719b86a1056601379e79e3676f217414afc185e4466412d8913c6e8544e189671dd25fd35fcec98ab4e23ebda6503d80bc8f4fcc92d179036c

  • SSDEEP

    12288:lfAMXkhMOoltiJ70CWYa/GbGfN8ft7Vwijd3kNTj7gLHQ/vQpWCajTD8:Lkh5oDiJ7+iGfNZfGcKa/D

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

shllesstarired221.duckdns.org:37837

Targets

    • Target

      64d09f36ee04a36d13b884c892e426109512270a003c3509c33066cf7349c56a

    • Size

      595KB

    • MD5

      3b160a3db7b8761984be21ae2f936ab2

    • SHA1

      41bb93bd501c3d5ad76de80a8514abc9dc669496

    • SHA256

      64d09f36ee04a36d13b884c892e426109512270a003c3509c33066cf7349c56a

    • SHA512

      f36327946f917d719b86a1056601379e79e3676f217414afc185e4466412d8913c6e8544e189671dd25fd35fcec98ab4e23ebda6503d80bc8f4fcc92d179036c

    • SSDEEP

      12288:lfAMXkhMOoltiJ70CWYa/GbGfN8ft7Vwijd3kNTj7gLHQ/vQpWCajTD8:Lkh5oDiJ7+iGfNZfGcKa/D

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks