General

  • Target

    5de17a5a924075eff342030dc58fab7443edb2a68c90749f674a5465552d1978.exe

  • Size

    673KB

  • Sample

    250217-dzt8jaykft

  • MD5

    eac8d64bfbc083aa74bcf866c9dea7ac

  • SHA1

    35b212e526376571b475664237a0d9b55810ad9e

  • SHA256

    5de17a5a924075eff342030dc58fab7443edb2a68c90749f674a5465552d1978

  • SHA512

    ac91135c1244ee8d4db77a04b9e2544eb1b3511935480881d3b91e751723d7f46308df579831d8651fc8d59938d3c85b8eb5cb421c2beb8cf95700e99c9384b4

  • SSDEEP

    12288:FcvVY6ao4/7xefpM4gwzzsCCB4sQqF8oDfArJPobxrJ+AS74kP:6vVJutehqUzzsQE8MfiotMA0

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.137.22.234:55615

Targets

    • Target

      5de17a5a924075eff342030dc58fab7443edb2a68c90749f674a5465552d1978.exe

    • Size

      673KB

    • MD5

      eac8d64bfbc083aa74bcf866c9dea7ac

    • SHA1

      35b212e526376571b475664237a0d9b55810ad9e

    • SHA256

      5de17a5a924075eff342030dc58fab7443edb2a68c90749f674a5465552d1978

    • SHA512

      ac91135c1244ee8d4db77a04b9e2544eb1b3511935480881d3b91e751723d7f46308df579831d8651fc8d59938d3c85b8eb5cb421c2beb8cf95700e99c9384b4

    • SSDEEP

      12288:FcvVY6ao4/7xefpM4gwzzsCCB4sQqF8oDfArJPobxrJ+AS74kP:6vVJutehqUzzsQE8MfiotMA0

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Downloads MZ/PE file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks