General

  • Target

    1932-73-0x0000000000570000-0x000000000058E000-memory.dmp

  • Size

    120KB

  • Sample

    230327-3b4vhafg86

  • MD5

    b8ea0e0c3c6c5b6174791f8f3c02e7d5

  • SHA1

    4c751a99876f7c35da5491bf3b1a0156f97312d1

  • SHA256

    2a106821037149320557be73769f0672e3b81c56155a9c62127c31bbd20b4b59

  • SHA512

    c4a51937e55f370afe649f0ad37fc65539c74eda7e72fac389220c68d19c880faf5291486db061efdf62f12c5bcc0c3e8b1d93b182b5e8d5369a1de327bd1800

  • SSDEEP

    1536:NqsIiqeHlbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2mteulgS6pIl:7vpVYH+zi0ZbYe1g0ujyzdeI

Malware Config

Extracted

Family

redline

Botnet

CHINA2023LOGZ

C2

193.42.32.107:16808

Targets

    • Target

      1932-73-0x0000000000570000-0x000000000058E000-memory.dmp

    • Size

      120KB

    • MD5

      b8ea0e0c3c6c5b6174791f8f3c02e7d5

    • SHA1

      4c751a99876f7c35da5491bf3b1a0156f97312d1

    • SHA256

      2a106821037149320557be73769f0672e3b81c56155a9c62127c31bbd20b4b59

    • SHA512

      c4a51937e55f370afe649f0ad37fc65539c74eda7e72fac389220c68d19c880faf5291486db061efdf62f12c5bcc0c3e8b1d93b182b5e8d5369a1de327bd1800

    • SSDEEP

      1536:NqsIiqeHlbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2mteulgS6pIl:7vpVYH+zi0ZbYe1g0ujyzdeI

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks