General

  • Target

    2b771c1cb7b010caabf91c4dfae0a45d

  • Size

    414KB

  • Sample

    231221-3tzcqsccdr

  • MD5

    2b771c1cb7b010caabf91c4dfae0a45d

  • SHA1

    fdf4ca2227e44e381dbc317844cbbd4653da1924

  • SHA256

    352a43d0ba6e4225d6d916d37eee5bdb7a48b4be591f1c284bc9743960c4e1dd

  • SHA512

    964649ef4d62bafa2449bc779245b0e98f79ea98ee8f6503c8eb5e536afa702ea8d33bfd4dbe3fadfc1de76ebc283fed4d96af55525c559b8058f1fdf65fd093

  • SSDEEP

    12288:IvtsflILz8O4DNFPL6CPPInb0ZHRKH1Cl55E:2kk8O4DjPTXvRRKVC

Malware Config

Extracted

Family

redline

Botnet

Windows

C2

190.2.145.65:80

Extracted

Family

redline

Botnet

3

C2

168.119.115.251:25171

Targets

    • Target

      2b771c1cb7b010caabf91c4dfae0a45d

    • Size

      414KB

    • MD5

      2b771c1cb7b010caabf91c4dfae0a45d

    • SHA1

      fdf4ca2227e44e381dbc317844cbbd4653da1924

    • SHA256

      352a43d0ba6e4225d6d916d37eee5bdb7a48b4be591f1c284bc9743960c4e1dd

    • SHA512

      964649ef4d62bafa2449bc779245b0e98f79ea98ee8f6503c8eb5e536afa702ea8d33bfd4dbe3fadfc1de76ebc283fed4d96af55525c559b8058f1fdf65fd093

    • SSDEEP

      12288:IvtsflILz8O4DNFPL6CPPInb0ZHRKH1Cl55E:2kk8O4DjPTXvRRKVC

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks