General

  • Target

    005c22fac9c769906f4b87e0438abfc3.exe

  • Size

    95KB

  • Sample

    230825-zye8wagd7y

  • MD5

    005c22fac9c769906f4b87e0438abfc3

  • SHA1

    7e97fc8440e6f6fc64081309e354ea51c1a6a42c

  • SHA256

    4df0f56f1d35031185dc8e5431d2ec804bdc37f70ea1bebed20b4a9e903dc535

  • SHA512

    3e9b87bb9e1fc57807b2cd0f22fe1cfc2d5e9ac3ac0a0f3d0b538a122eedcb9a72302490fef7ddc3c5db08169bf925cede564063d0ae355e29f8b40559c7d326

  • SSDEEP

    1536:5qsCbqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed263tmulgS6p8l:XEwiYj+zi0ZbYe1g0ujyzdo8

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.237.15.169:27164

Targets

    • Target

      005c22fac9c769906f4b87e0438abfc3.exe

    • Size

      95KB

    • MD5

      005c22fac9c769906f4b87e0438abfc3

    • SHA1

      7e97fc8440e6f6fc64081309e354ea51c1a6a42c

    • SHA256

      4df0f56f1d35031185dc8e5431d2ec804bdc37f70ea1bebed20b4a9e903dc535

    • SHA512

      3e9b87bb9e1fc57807b2cd0f22fe1cfc2d5e9ac3ac0a0f3d0b538a122eedcb9a72302490fef7ddc3c5db08169bf925cede564063d0ae355e29f8b40559c7d326

    • SSDEEP

      1536:5qsCbqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed263tmulgS6p8l:XEwiYj+zi0ZbYe1g0ujyzdo8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

MITRE ATT&CK Enterprise v15

Tasks