General

  • Target

    8e0295cba863c4dd3532fe1e0f7adecfba02cc348addf85cb515abfff5f444ef.exe

  • Size

    322KB

  • Sample

    241210-lrgw8ssnfv

  • MD5

    a08a6210cf08941ef3db7829523fd75a

  • SHA1

    e00aadff2a576dbab87763f9197a3c4b87ce1538

  • SHA256

    8e0295cba863c4dd3532fe1e0f7adecfba02cc348addf85cb515abfff5f444ef

  • SHA512

    4cf2bc8a9b05cb0cf793d3133fe3318bea037dcb1e6079bd095aebe39da761d4c3538f2d349367cc0721b1ef3f29a09ab640c7db0fb480a0f26703a46337e1bf

  • SSDEEP

    6144:VxPOAfsdY0LoOaYo7jaO00ssjxAODSNCgRmo+ItzK21OOeym:VxmGsdY0LoOaHORB+a+24ym

Malware Config

Extracted

Family

redline

Botnet

@bo0tlegger

C2

185.209.22.181:34925

Attributes
  • auth_value

    5a0918bd3e8ede8e02c8dd9d106a996d

Targets

    • Target

      8e0295cba863c4dd3532fe1e0f7adecfba02cc348addf85cb515abfff5f444ef.exe

    • Size

      322KB

    • MD5

      a08a6210cf08941ef3db7829523fd75a

    • SHA1

      e00aadff2a576dbab87763f9197a3c4b87ce1538

    • SHA256

      8e0295cba863c4dd3532fe1e0f7adecfba02cc348addf85cb515abfff5f444ef

    • SHA512

      4cf2bc8a9b05cb0cf793d3133fe3318bea037dcb1e6079bd095aebe39da761d4c3538f2d349367cc0721b1ef3f29a09ab640c7db0fb480a0f26703a46337e1bf

    • SSDEEP

      6144:VxPOAfsdY0LoOaYo7jaO00ssjxAODSNCgRmo+ItzK21OOeym:VxmGsdY0LoOaHORB+a+24ym

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks