General

  • Target

    52e08cf417542015e47ebffd7621272bfa299d59ff6f651b3983b0d73339eaeb.exe

  • Size

    1.1MB

  • Sample

    250326-a1dqdsvwex

  • MD5

    7900cbc60f5157b5bfc39e73f5671e53

  • SHA1

    2fd5cd1b3b8743393c7cb5cc149391d81a66b399

  • SHA256

    52e08cf417542015e47ebffd7621272bfa299d59ff6f651b3983b0d73339eaeb

  • SHA512

    159cd6c3f72d63a88075d58809b07b42145e6f1e77633bec7a2b83f425c4276b2827edd0e1f1103953dab160d94fc5cf2cad968644abb17344c1310fb530aa6d

  • SSDEEP

    24576:pu6J33O0c+JY5UZ+XC0kGso6FaZ3X3N5LMyC6t3IPWY:Lu0c++OCvkGs9FaZH3N5wyCGY

Malware Config

Extracted

Family

redline

Botnet

vex4you

C2

209.38.151.4:55123

Targets

    • Target

      52e08cf417542015e47ebffd7621272bfa299d59ff6f651b3983b0d73339eaeb.exe

    • Size

      1.1MB

    • MD5

      7900cbc60f5157b5bfc39e73f5671e53

    • SHA1

      2fd5cd1b3b8743393c7cb5cc149391d81a66b399

    • SHA256

      52e08cf417542015e47ebffd7621272bfa299d59ff6f651b3983b0d73339eaeb

    • SHA512

      159cd6c3f72d63a88075d58809b07b42145e6f1e77633bec7a2b83f425c4276b2827edd0e1f1103953dab160d94fc5cf2cad968644abb17344c1310fb530aa6d

    • SSDEEP

      24576:pu6J33O0c+JY5UZ+XC0kGso6FaZ3X3N5LMyC6t3IPWY:Lu0c++OCvkGs9FaZH3N5wyCGY

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.