General

  • Target

    7350177a6ad69becc15c250ae9f9e8ae9222f8499ebda3f5ee6e069ef6e3bc54

  • Size

    708KB

  • Sample

    240309-aafgasab89

  • MD5

    014feeea3acc5dc8846f4c358be6dbf2

  • SHA1

    4a1aa3cd3c85bfc59c8d7671a78d5f67a19948a6

  • SHA256

    7350177a6ad69becc15c250ae9f9e8ae9222f8499ebda3f5ee6e069ef6e3bc54

  • SHA512

    0b8c67fb31f25fb06f4942c40920dba4771617f911ba13fcacebd1ee952f39c821cf9e4ba8aa80da578688d5f98ac0111a1999659f17450d233b9feba0cb67eb

  • SSDEEP

    12288:K6ErxJMTtEultk8Mn/fRRCY85nKbQI0St1EvFsIyMzrC15bavKV/CQy1QoswZLJZ:KJr8tE+28yRRKnKsQtGdsPMzrs5+vKV2

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.137.22.229:55615

Targets

    • Target

      7350177a6ad69becc15c250ae9f9e8ae9222f8499ebda3f5ee6e069ef6e3bc54

    • Size

      708KB

    • MD5

      014feeea3acc5dc8846f4c358be6dbf2

    • SHA1

      4a1aa3cd3c85bfc59c8d7671a78d5f67a19948a6

    • SHA256

      7350177a6ad69becc15c250ae9f9e8ae9222f8499ebda3f5ee6e069ef6e3bc54

    • SHA512

      0b8c67fb31f25fb06f4942c40920dba4771617f911ba13fcacebd1ee952f39c821cf9e4ba8aa80da578688d5f98ac0111a1999659f17450d233b9feba0cb67eb

    • SSDEEP

      12288:K6ErxJMTtEultk8Mn/fRRCY85nKbQI0St1EvFsIyMzrC15bavKV/CQy1QoswZLJZ:KJr8tE+28yRRKnKsQtGdsPMzrs5+vKV2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks