General

  • Target

    e4a200fc3da152d2b8c48f6e19b8ec97

  • Size

    787KB

  • Sample

    250331-t8vtestwbs

  • MD5

    e4a200fc3da152d2b8c48f6e19b8ec97

  • SHA1

    6104b851cccad3628b12d4ca136b8f364bbd3d35

  • SHA256

    95d29f64d0106c91070bcd511f78f6cf29d35cdb8cbbd97cfdfdcf61e422b4da

  • SHA512

    d704391d9a566a889398af1d119e46aecfa9421802cb14785847a64d4848874f2b65aed132d955f624a848fead5b2cb48a9805c90d5df2e230064775f6f015ea

  • SSDEEP

    6144:YMOuBuN9xo1rFJLgGu8BWsijyckMnCgstzX29Hr13PKLeifjdUQhNZ:YMOuBuN9xoS8BWHjVktgMOHh3PKyGf

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

172.31.9.183:29120

Targets

    • Target

      e4a200fc3da152d2b8c48f6e19b8ec97

    • Size

      787KB

    • MD5

      e4a200fc3da152d2b8c48f6e19b8ec97

    • SHA1

      6104b851cccad3628b12d4ca136b8f364bbd3d35

    • SHA256

      95d29f64d0106c91070bcd511f78f6cf29d35cdb8cbbd97cfdfdcf61e422b4da

    • SHA512

      d704391d9a566a889398af1d119e46aecfa9421802cb14785847a64d4848874f2b65aed132d955f624a848fead5b2cb48a9805c90d5df2e230064775f6f015ea

    • SSDEEP

      6144:YMOuBuN9xo1rFJLgGu8BWsijyckMnCgstzX29Hr13PKLeifjdUQhNZ:YMOuBuN9xoS8BWHjVktgMOHh3PKyGf

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.