General

  • Target

    d7e807e56e40b35109fa8009fd239799e62c1be1835a39a1fc2057e23575659e.exe

  • Size

    577KB

  • Sample

    250225-halx3stjv2

  • MD5

    5fd70f0471b4325ed9f621ad3c7d6af2

  • SHA1

    ee80f46e62cb8e24119e69ce0c5fa58aa3a038af

  • SHA256

    d7e807e56e40b35109fa8009fd239799e62c1be1835a39a1fc2057e23575659e

  • SHA512

    0263b1f9ddf76efe781368237389848006ff144554834e572dd482c4b9ef9758febf813a6ebbf4dba086638452fe71c5bd93f19967c1f77abeef63fb1e421764

  • SSDEEP

    12288:Ixxgm9khVuCPpfNncA1cpmh/X3wbtIb10sJ9R5:IHMvH9W2c0vst810E9R5

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.137.22.234:55615

Targets

    • Target

      d7e807e56e40b35109fa8009fd239799e62c1be1835a39a1fc2057e23575659e.exe

    • Size

      577KB

    • MD5

      5fd70f0471b4325ed9f621ad3c7d6af2

    • SHA1

      ee80f46e62cb8e24119e69ce0c5fa58aa3a038af

    • SHA256

      d7e807e56e40b35109fa8009fd239799e62c1be1835a39a1fc2057e23575659e

    • SHA512

      0263b1f9ddf76efe781368237389848006ff144554834e572dd482c4b9ef9758febf813a6ebbf4dba086638452fe71c5bd93f19967c1f77abeef63fb1e421764

    • SSDEEP

      12288:Ixxgm9khVuCPpfNncA1cpmh/X3wbtIb10sJ9R5:IHMvH9W2c0vst810E9R5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks