General

  • Target

    b0f34e6d095cf54df8c7551443541824

  • Size

    1.2MB

  • Sample

    240304-chsspsfg58

  • MD5

    b0f34e6d095cf54df8c7551443541824

  • SHA1

    5acb9ead5daeb93fd0fa3fdb3f5b36552c3437b4

  • SHA256

    8d6ceb54bdbe22963289973d96475e5ed61d0693d08f80480b5478c5353a98df

  • SHA512

    0eaf4744ab1fd3929679dc8462baf8cb957c3cf9951530c056b6460be7209f13fdaf2ebd14ba4f7ded5871a1d2c9cbcdd0885e4b5ccc2c18e71055b795cebfaf

  • SSDEEP

    24576:z7WMnjoBal9R9sr/aWMHnRV/VVTFtC9gw5tW3TOuHuWF0ZoFq0gW:3RNnRjWMxHVO6n3iZoso

Malware Config

Extracted

Family

redline

Botnet

2

C2

fiamedanes.xyz:80

Targets

    • Target

      b0f34e6d095cf54df8c7551443541824

    • Size

      1.2MB

    • MD5

      b0f34e6d095cf54df8c7551443541824

    • SHA1

      5acb9ead5daeb93fd0fa3fdb3f5b36552c3437b4

    • SHA256

      8d6ceb54bdbe22963289973d96475e5ed61d0693d08f80480b5478c5353a98df

    • SHA512

      0eaf4744ab1fd3929679dc8462baf8cb957c3cf9951530c056b6460be7209f13fdaf2ebd14ba4f7ded5871a1d2c9cbcdd0885e4b5ccc2c18e71055b795cebfaf

    • SSDEEP

      24576:z7WMnjoBal9R9sr/aWMHnRV/VVTFtC9gw5tW3TOuHuWF0ZoFq0gW:3RNnRjWMxHVO6n3iZoso

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks