General

  • Target

    b814a2ff0211c61495240f6dd2cac976389f41ee20c0ac6cf2e0fad0f420c92eN.exe

  • Size

    322KB

  • Sample

    241211-qnf8raymfl

  • MD5

    caaf80768b100f42eba895694c0be030

  • SHA1

    9681d2ccb7f171d8cf1a97beddbc48392e34a595

  • SHA256

    b814a2ff0211c61495240f6dd2cac976389f41ee20c0ac6cf2e0fad0f420c92e

  • SHA512

    8876e7e3b2fef594f2b1e157bbed19480ebafbc3dbcca7b19e8ee2fac9dac33febabbcc5691ba0b77a659336a17d3a099ff83b192a15620bac1c78a2e9ba2696

  • SSDEEP

    6144:VxPOAfsdY0LoOaYo7jaO00ssjxAODSNCgRmo+ItzK21OOey:VxmGsdY0LoOaHORB+a+24y

Malware Config

Extracted

Family

redline

Botnet

@bo0tlegger

C2

185.209.22.181:34925

Attributes
  • auth_value

    5a0918bd3e8ede8e02c8dd9d106a996d

Targets

    • Target

      b814a2ff0211c61495240f6dd2cac976389f41ee20c0ac6cf2e0fad0f420c92eN.exe

    • Size

      322KB

    • MD5

      caaf80768b100f42eba895694c0be030

    • SHA1

      9681d2ccb7f171d8cf1a97beddbc48392e34a595

    • SHA256

      b814a2ff0211c61495240f6dd2cac976389f41ee20c0ac6cf2e0fad0f420c92e

    • SHA512

      8876e7e3b2fef594f2b1e157bbed19480ebafbc3dbcca7b19e8ee2fac9dac33febabbcc5691ba0b77a659336a17d3a099ff83b192a15620bac1c78a2e9ba2696

    • SSDEEP

      6144:VxPOAfsdY0LoOaYo7jaO00ssjxAODSNCgRmo+ItzK21OOey:VxmGsdY0LoOaHORB+a+24y

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks