General

  • Target

    d343a781dec5fea6f9e8bb491fe8334889fdd4c4d5b4f0c768ca2233da8f41bd.exe

  • Size

    95KB

  • Sample

    240617-xnsp4svakn

  • MD5

    670a4332ef2c1b9565c7eabae4d96118

  • SHA1

    59e79d8ceffe4b3fb1d25f8cd2a0b39d86050fa5

  • SHA256

    d343a781dec5fea6f9e8bb491fe8334889fdd4c4d5b4f0c768ca2233da8f41bd

  • SHA512

    300195425ed3ab50540f84c52b9989b3bbaf5aa0a0f693d3b4109b3f93e731045e650fa8991eb6ed70f6ebd1efd82eb8bac0e5c3c7a77a33b30e254e1d9a1664

  • SSDEEP

    1536:9qsINqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2r3teulgS6pY:rAMOY3+zi0ZbYe1g0ujyzdHY

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.58.77:55615

Targets

    • Target

      d343a781dec5fea6f9e8bb491fe8334889fdd4c4d5b4f0c768ca2233da8f41bd.exe

    • Size

      95KB

    • MD5

      670a4332ef2c1b9565c7eabae4d96118

    • SHA1

      59e79d8ceffe4b3fb1d25f8cd2a0b39d86050fa5

    • SHA256

      d343a781dec5fea6f9e8bb491fe8334889fdd4c4d5b4f0c768ca2233da8f41bd

    • SHA512

      300195425ed3ab50540f84c52b9989b3bbaf5aa0a0f693d3b4109b3f93e731045e650fa8991eb6ed70f6ebd1efd82eb8bac0e5c3c7a77a33b30e254e1d9a1664

    • SSDEEP

      1536:9qsINqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2r3teulgS6pY:rAMOY3+zi0ZbYe1g0ujyzdHY

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks