General

  • Target

    5ec516966f34ccbb02bc0697b907b3feaee4ffae4637015fccef69e8f1ed3775.exe

  • Size

    95KB

  • Sample

    241204-tzs88s1lfx

  • MD5

    6b41dfbac060a8296dcb7977246e7e03

  • SHA1

    12d9e80801c5bd718279532b60eeed32d0e41eee

  • SHA256

    5ec516966f34ccbb02bc0697b907b3feaee4ffae4637015fccef69e8f1ed3775

  • SHA512

    c4ee1a5ad1d75c69940646b8761cab02f7e0c9bfeced8662e34a3f090d3b2d99782c3d585a8729d5177cd6405ff43178e1057af14dcab64285c45c0e3ff34b38

  • SSDEEP

    1536:9qskNqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2SteulgS6pY:r8MOY3+zi0ZbYe1g0ujyzdyY

Malware Config

Extracted

Family

redline

Botnet

deepweb

C2

141.98.6.120:1334

Targets

    • Target

      5ec516966f34ccbb02bc0697b907b3feaee4ffae4637015fccef69e8f1ed3775.exe

    • Size

      95KB

    • MD5

      6b41dfbac060a8296dcb7977246e7e03

    • SHA1

      12d9e80801c5bd718279532b60eeed32d0e41eee

    • SHA256

      5ec516966f34ccbb02bc0697b907b3feaee4ffae4637015fccef69e8f1ed3775

    • SHA512

      c4ee1a5ad1d75c69940646b8761cab02f7e0c9bfeced8662e34a3f090d3b2d99782c3d585a8729d5177cd6405ff43178e1057af14dcab64285c45c0e3ff34b38

    • SSDEEP

      1536:9qskNqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2SteulgS6pY:r8MOY3+zi0ZbYe1g0ujyzdyY

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks