General

  • Target

    b5f2049cce55c465bb3c4ed1ea424960

  • Size

    3.3MB

  • Sample

    240305-3l8w7sdg55

  • MD5

    b5f2049cce55c465bb3c4ed1ea424960

  • SHA1

    99ad1dbf6ba2806fb73a3b48b2fc6544aa8510ef

  • SHA256

    3fb5d581908006ebf02c95e6811711a4c3fe211ec9e7ba029003894a60082e48

  • SHA512

    aa2c5dcb0c99e139815b3dab18630a754cb6ca79009d5055bf251885af22fa5311ce1598e9c2f7eba84d97682df04590a65437f02959f8058f940c89eb9d0a64

  • SSDEEP

    98304:45eezchKvrp1oBwwRjv50iry21hYJqdGxHprjbXAi3Lyrofv:ASAp1i9RjvHV1hMqd2HpF3fv

Malware Config

Extracted

Family

redline

Botnet

@SabayNigger

C2

185.241.54.128:47729

Targets

    • Target

      b5f2049cce55c465bb3c4ed1ea424960

    • Size

      3.3MB

    • MD5

      b5f2049cce55c465bb3c4ed1ea424960

    • SHA1

      99ad1dbf6ba2806fb73a3b48b2fc6544aa8510ef

    • SHA256

      3fb5d581908006ebf02c95e6811711a4c3fe211ec9e7ba029003894a60082e48

    • SHA512

      aa2c5dcb0c99e139815b3dab18630a754cb6ca79009d5055bf251885af22fa5311ce1598e9c2f7eba84d97682df04590a65437f02959f8058f940c89eb9d0a64

    • SSDEEP

      98304:45eezchKvrp1oBwwRjv50iry21hYJqdGxHprjbXAi3Lyrofv:ASAp1i9RjvHV1hMqd2HpF3fv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks