General

  • Target

    365d51f2587b2543fa0e1d96d715d4efef4fb1dbfd1607f2a0dc07f738d89210

  • Size

    922KB

  • Sample

    241205-v8yezsvkgs

  • MD5

    398acf3daf03b84eeff950be321080ef

  • SHA1

    a42dbd4cd5e1b2fd40ef365dcf87bc15fd0c2b90

  • SHA256

    365d51f2587b2543fa0e1d96d715d4efef4fb1dbfd1607f2a0dc07f738d89210

  • SHA512

    07f6a3474a08658d843fb388ebaa0ead1884ce2bd3ebe3725a5485db1a248e78a257b855177f8619ac6b6b73541e0582f8894c5955a0710763925766a7477cb8

  • SSDEEP

    12288:ALkcoxg7v3qnC11ErwIhh0F4qwUgUny5Q65Q9fMw+jBow7YRwCDpO28OSt:WfmMv6Ckr7Mny5Q6O9f7+jBow72w08nt

Malware Config

Extracted

Family

redline

Botnet

pee

C2

188.190.10.10:55123

Targets

    • Target

      365d51f2587b2543fa0e1d96d715d4efef4fb1dbfd1607f2a0dc07f738d89210

    • Size

      922KB

    • MD5

      398acf3daf03b84eeff950be321080ef

    • SHA1

      a42dbd4cd5e1b2fd40ef365dcf87bc15fd0c2b90

    • SHA256

      365d51f2587b2543fa0e1d96d715d4efef4fb1dbfd1607f2a0dc07f738d89210

    • SHA512

      07f6a3474a08658d843fb388ebaa0ead1884ce2bd3ebe3725a5485db1a248e78a257b855177f8619ac6b6b73541e0582f8894c5955a0710763925766a7477cb8

    • SSDEEP

      12288:ALkcoxg7v3qnC11ErwIhh0F4qwUgUny5Q65Q9fMw+jBow7YRwCDpO28OSt:WfmMv6Ckr7Mny5Q6O9f7+jBow72w08nt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks