General

  • Target

    331e84793b6df944380ef4080201836672a970bc462bba8e925774780eb94192

  • Size

    771KB

  • Sample

    240308-29dwashg58

  • MD5

    02be2d092c3c9adf759de710d15f20f0

  • SHA1

    1a1b63a7aa4e3c67b9a43656ad60bbbea51ddbdb

  • SHA256

    331e84793b6df944380ef4080201836672a970bc462bba8e925774780eb94192

  • SHA512

    80b8b34948c97f22fc3fd8b649304256d9c5b3106c6766d32147506bc7421451ffe89c28c94a72f724b02cf929b8a48497ef5f9be18cf5d042408d5116e93d10

  • SSDEEP

    24576:/DkUNi1EvGdWHoDSEBvFPB81edGvUEBq2Q:/DkUrOdWHoDL5N7UHq2Q

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.58.81:55615

Targets

    • Target

      331e84793b6df944380ef4080201836672a970bc462bba8e925774780eb94192

    • Size

      771KB

    • MD5

      02be2d092c3c9adf759de710d15f20f0

    • SHA1

      1a1b63a7aa4e3c67b9a43656ad60bbbea51ddbdb

    • SHA256

      331e84793b6df944380ef4080201836672a970bc462bba8e925774780eb94192

    • SHA512

      80b8b34948c97f22fc3fd8b649304256d9c5b3106c6766d32147506bc7421451ffe89c28c94a72f724b02cf929b8a48497ef5f9be18cf5d042408d5116e93d10

    • SSDEEP

      24576:/DkUNi1EvGdWHoDSEBvFPB81edGvUEBq2Q:/DkUrOdWHoDL5N7UHq2Q

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks