General

  • Target

    3687ef3be4510535637f4ecd83fc3c06.bin

  • Size

    43KB

  • Sample

    230322-blf3msga6z

  • MD5

    1b27fbb14e6642a5100bf5db026ceaa4

  • SHA1

    31d45f57bbe1fd1d41ee5e14652914135668f878

  • SHA256

    2c35bb657c820d465959ff7d45cfa572a073cca005ca935f473517d290332ea0

  • SHA512

    a8c67901ac384463ce9a5187ce252aaed662e9e1056b462fb92a3c12d0ad09c7ca33f3e1a33176941209a662218f6badcaccc8a1d6a820e04814f228bba2f7cc

  • SSDEEP

    768:GF8XQdW2w9gb+0sy+rsSEUWybuYQkUYwyv3UaSP6fDn2XQParCJZ0hA7k1weej6w:S8X3V91pysDRWpYQDDk3JSP6fr/9zJeC

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

20.55.36.227:1067

Targets

    • Target

      4690009d20b0534364782d6b917ec071efe3068a6ef688f17d7a4a67948b30db.exe

    • Size

      95KB

    • MD5

      3687ef3be4510535637f4ecd83fc3c06

    • SHA1

      275aff278321e28462f9e67fcef9b46fd3238418

    • SHA256

      4690009d20b0534364782d6b917ec071efe3068a6ef688f17d7a4a67948b30db

    • SHA512

      56906c639d87175f30ec00e78aba4bbf811591a8bd32336e219bc281b19fe856712a9afe98fbcb59670fe5c34fdf2e096dc9f1e89e9beb2a28a9d879c5390fa4

    • SSDEEP

      1536:xqskjlqzWlbG6jejoigIr43Ywzi0Zb78ivombfexv0ujXyyed2+3teulgS6pk:fYUeYr+zi0ZbYe1g0ujyzdok

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks