General

  • Target

    75184d23f2274ec055b70fb9a78ad166

  • Size

    876KB

  • Sample

    240125-v2ez3abff4

  • MD5

    75184d23f2274ec055b70fb9a78ad166

  • SHA1

    d985714db286580a68de67f5717c8481b6490ea5

  • SHA256

    dbff81f2bdd65f4f99e28fcdbbb4b410f5a12d9882b866b82082602899f610dc

  • SHA512

    6897423ddc4c9b53d71547f75974030e58c56d908095186d469e1979fec27863749cc648dfbdf782a7a11c7d77cd5225f6ef5fa5d8967cdacd0db44dad263b89

  • SSDEEP

    24576:nyLHuEU/Ve5SXJe8qXHgaKpr6gLUIpnK2ljS27vs:yLOgR3fgLPpyU

Malware Config

Extracted

Family

redline

Botnet

Build2_Mastif

C2

95.181.157.69:8552

Targets

    • Target

      75184d23f2274ec055b70fb9a78ad166

    • Size

      876KB

    • MD5

      75184d23f2274ec055b70fb9a78ad166

    • SHA1

      d985714db286580a68de67f5717c8481b6490ea5

    • SHA256

      dbff81f2bdd65f4f99e28fcdbbb4b410f5a12d9882b866b82082602899f610dc

    • SHA512

      6897423ddc4c9b53d71547f75974030e58c56d908095186d469e1979fec27863749cc648dfbdf782a7a11c7d77cd5225f6ef5fa5d8967cdacd0db44dad263b89

    • SSDEEP

      24576:nyLHuEU/Ve5SXJe8qXHgaKpr6gLUIpnK2ljS27vs:yLOgR3fgLPpyU

    • Kinsing

      Kinsing is a loader written in Golang.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks