General

  • Target

    55d48276b91ae07b4a4b26ab074d2fae49ffdee7f227fc62587a46696ecbf2b3.exe

  • Size

    568KB

  • Sample

    250120-dx1brsyne1

  • MD5

    963f526636c53e9ecf5af8025e0daca0

  • SHA1

    bf41a267e768fca782e6861ba274aac58f79a959

  • SHA256

    55d48276b91ae07b4a4b26ab074d2fae49ffdee7f227fc62587a46696ecbf2b3

  • SHA512

    85d347f552ee0f73af7e5f198430c452b4194f73f9313007f4e800e3fc2a9cc07c6c20de7cf81ac6530ff45b35b09b8ae137f01319ed86ceb084329ebff67fa8

  • SSDEEP

    12288:UfLYRxA4Y5lyA/BxSPCPU0/iRsFpPQPht0XJ1vzUZdJFk7UQlbd9JU:XR6KRDPht0HgHUvbdX

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.57.84:55615

Targets

    • Target

      55d48276b91ae07b4a4b26ab074d2fae49ffdee7f227fc62587a46696ecbf2b3.exe

    • Size

      568KB

    • MD5

      963f526636c53e9ecf5af8025e0daca0

    • SHA1

      bf41a267e768fca782e6861ba274aac58f79a959

    • SHA256

      55d48276b91ae07b4a4b26ab074d2fae49ffdee7f227fc62587a46696ecbf2b3

    • SHA512

      85d347f552ee0f73af7e5f198430c452b4194f73f9313007f4e800e3fc2a9cc07c6c20de7cf81ac6530ff45b35b09b8ae137f01319ed86ceb084329ebff67fa8

    • SSDEEP

      12288:UfLYRxA4Y5lyA/BxSPCPU0/iRsFpPQPht0XJ1vzUZdJFk7UQlbd9JU:XR6KRDPht0HgHUvbdX

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks