General

  • Target

    2d8a45f0de92aeb5fc5495c2df0072a00e4d2215b0b2c1ccfd1580d752e32f27.zip

  • Size

    494KB

  • Sample

    250331-s1w6vasyaw

  • MD5

    18d08e149b5e1e69e5e81526e05db563

  • SHA1

    28184f3c1269f81329016bd6dc803e0d5605615d

  • SHA256

    dde9e9fd744a44acab428066092698407bb7bd48d2387f7bb2909966b9392c31

  • SHA512

    1daf13a986d528f8b9b19118bae42c8d050d96d57c37fed433e1a843096ee316acbf79077aebbbac9ecd52be8e3621ddafc69b4557a2407627533bbf092a5eb7

  • SSDEEP

    12288:E9YGoZirx1rgfVnRxuPOICTw0AU7t5SZpLSwV:E9Wox1rkfusTRVSZAM

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.57.71:55615

Targets

    • Target

      2d8a45f0de92aeb5fc5495c2df0072a00e4d2215b0b2c1ccfd1580d752e32f27.exe

    • Size

      590KB

    • MD5

      41ece00a8f6eb23dc9b2c4e839264896

    • SHA1

      019af05aedb454d15f193713fef31524cfab6e6d

    • SHA256

      2d8a45f0de92aeb5fc5495c2df0072a00e4d2215b0b2c1ccfd1580d752e32f27

    • SHA512

      6575ec2bee5e4389050b115dfdc7c0d4cae780fdd5d24478981b0c4caa79c31751be6d3ce7655fd6ca5769fcebad90072c31971d0f697ca924ba431951bf7290

    • SSDEEP

      12288:WQAvPbfo3cZiJDYH3T2iOltmr7VUdNsf3z6mvNg8tytefqLTf1:OvPbxZ6DOFo0rebsP7vNg9teyTd

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks