General

  • Target

    cab862dad410ab2628003fb504c39dbb32d790d5f86eb5a0aade404476396264N.exe

  • Size

    1.1MB

  • Sample

    241219-g8kbgasmhv

  • MD5

    dd1f58dfa9b574320cfdbcf9dcdf7e50

  • SHA1

    13695c1d58dc8db9616d187b5ab63ae31b540d7e

  • SHA256

    cab862dad410ab2628003fb504c39dbb32d790d5f86eb5a0aade404476396264

  • SHA512

    16ee8cb70ec344657f8dadf261203490e344b10736b84f3a62e244d8c25c1a0e728277cbc5947c705f7e692b1c2f2c8904d383358f50fc2eee265bcea3c8114e

  • SSDEEP

    24576:x5ZWpq5JLimIQTXtUNKcGBZ1ntjaqCkMOHMDmHtjv:x5ZWU5JLimIktUNqB/V3CAMD6

Malware Config

Extracted

Family

redline

Botnet

123123123

C2

91.214.78.251:32232

Targets

    • Target

      cab862dad410ab2628003fb504c39dbb32d790d5f86eb5a0aade404476396264N.exe

    • Size

      1.1MB

    • MD5

      dd1f58dfa9b574320cfdbcf9dcdf7e50

    • SHA1

      13695c1d58dc8db9616d187b5ab63ae31b540d7e

    • SHA256

      cab862dad410ab2628003fb504c39dbb32d790d5f86eb5a0aade404476396264

    • SHA512

      16ee8cb70ec344657f8dadf261203490e344b10736b84f3a62e244d8c25c1a0e728277cbc5947c705f7e692b1c2f2c8904d383358f50fc2eee265bcea3c8114e

    • SSDEEP

      24576:x5ZWpq5JLimIQTXtUNKcGBZ1ntjaqCkMOHMDmHtjv:x5ZWU5JLimIktUNqB/V3CAMD6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks