General

  • Target

    8a599ff1cee0f25d36332cc64f722673.exe

  • Size

    483KB

  • Sample

    230807-rmtywsgh71

  • MD5

    8a599ff1cee0f25d36332cc64f722673

  • SHA1

    242f2816c83cf26d49abc40079ba3458b1d58b2f

  • SHA256

    ad6672b5390661b265f162f695ce7e75d0f8a11bbc9847d04893155219c9c2b5

  • SHA512

    53a9a33a6889b3fa1c193f6bc9ec6606b6c780ef7f0c0749e64a15f744c9eca5d67531695b76a5508d8c1c49ce4098d414e90f58bb619447dc8ab4be5ab8ebd0

  • SSDEEP

    12288:sW3RmeuWCLraizRk5KnNOKNAPhCmjN/WN9i7cBapTkxyKW:ZoeuWCXd1zNORQO5WN4iWkxrW

Malware Config

Extracted

Family

redline

Botnet

trial

C2

173.44.141.116:38411

Targets

    • Target

      8a599ff1cee0f25d36332cc64f722673.exe

    • Size

      483KB

    • MD5

      8a599ff1cee0f25d36332cc64f722673

    • SHA1

      242f2816c83cf26d49abc40079ba3458b1d58b2f

    • SHA256

      ad6672b5390661b265f162f695ce7e75d0f8a11bbc9847d04893155219c9c2b5

    • SHA512

      53a9a33a6889b3fa1c193f6bc9ec6606b6c780ef7f0c0749e64a15f744c9eca5d67531695b76a5508d8c1c49ce4098d414e90f58bb619447dc8ab4be5ab8ebd0

    • SSDEEP

      12288:sW3RmeuWCLraizRk5KnNOKNAPhCmjN/WN9i7cBapTkxyKW:ZoeuWCXd1zNORQO5WN4iWkxrW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks