General

  • Target

    6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exe

  • Size

    4.5MB

  • Sample

    221127-aawtaahh2t

  • MD5

    d48e7bfd3aeb182e89b7e7ce883cd3f2

  • SHA1

    b851e6bbf0c6fa176dac656b7bf45eaaa073e5d8

  • SHA256

    6e587363f78cb91de1b18cfe6a44174eb9426b724bcc757c3f7314a2881d3b39

  • SHA512

    e5fbea3a7a1c85dc60c0953ababceb308bea28a5abb338804fc3c3e521ffe4e9b85eb0d717bd37a3862edbf6aaaa19c1f62a500ad53645a9ca0c57282b0fd1a5

  • SSDEEP

    49152:4DKt5jqtb72StuLh5cyqHo+oDc+HTst7R39JM9wWAToTCN7x/isxJ:E5KLhvN+ooV3ASWQ715xJ

Malware Config

Targets

    • Target

      6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exe

    • Size

      4.5MB

    • MD5

      d48e7bfd3aeb182e89b7e7ce883cd3f2

    • SHA1

      b851e6bbf0c6fa176dac656b7bf45eaaa073e5d8

    • SHA256

      6e587363f78cb91de1b18cfe6a44174eb9426b724bcc757c3f7314a2881d3b39

    • SHA512

      e5fbea3a7a1c85dc60c0953ababceb308bea28a5abb338804fc3c3e521ffe4e9b85eb0d717bd37a3862edbf6aaaa19c1f62a500ad53645a9ca0c57282b0fd1a5

    • SSDEEP

      49152:4DKt5jqtb72StuLh5cyqHo+oDc+HTst7R39JM9wWAToTCN7x/isxJ:E5KLhvN+ooV3ASWQ715xJ

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Async RAT payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks