General

  • Target

    c00de8b488c9399f6104e5e4da8bb326.bin

  • Size

    440KB

  • Sample

    231031-dj6lmaac29

  • MD5

    714e09bd3688aafad6e4575d96a5c336

  • SHA1

    cdef1de48ac14acc84b88488378efeba0bc00511

  • SHA256

    60608719510f648f408a616c69eed12decc189f6a2de8399db8869e5ef635c5e

  • SHA512

    17c1aa787c561bf88c91fb2d7be7c60530bf736062e1db7f9618d6cd1156d802610533a2bdd380e5918c411a387eb22bd544838026c9838b0e755cd3b0d6ed6d

  • SSDEEP

    12288:5vXsP6eanR1EWbvQMNvxXO1+15Mnr1eyR1gf9RIa:5vsPCMWb5vi+Anr8Og

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.137.22.168:55615

Targets

    • Target

      60543f63bdb95aa5eb03e848218983566c48fac35caa005209214b7ea70e5c09.exe

    • Size

      480KB

    • MD5

      c00de8b488c9399f6104e5e4da8bb326

    • SHA1

      41738e37f1aa7fe68f305f7c9f8e385c19761dd3

    • SHA256

      60543f63bdb95aa5eb03e848218983566c48fac35caa005209214b7ea70e5c09

    • SHA512

      669b01097afdf6e575a1267b01a2ba13c32954bd94c764adbeec237416524a36c11c54a1d30c2adf456ab9c7e4f24c2ca254791ee9157e9b3d98e4fe9dce2b16

    • SSDEEP

      6144:DGdOl/13jRFYTUn1S5ieek5lB+JfaLt2y0i1p6LtMeG+CVWt40yAE7kwzegKVW2Q:DGdgrYTU1oieb+JfaLx7eAVekze7eQp

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks