General

  • Target

    dfa785a11c98adec2ff4b2da28ad9f159bed1a031a8c8e1d82b662da9e4f1a3d

  • Size

    491KB

  • Sample

    240309-enpdksce55

  • MD5

    061732e9348c37ac6220e4f6994d0a83

  • SHA1

    b59bbaa0721426a729d5cd6ffb1620543f53e03d

  • SHA256

    dfa785a11c98adec2ff4b2da28ad9f159bed1a031a8c8e1d82b662da9e4f1a3d

  • SHA512

    d89afa4e8f95dc23417509444ff20b3b228cac3e32d222572cd716e4fdd0e0f098e520b1c99288f357c2d6fe4f5dd046003c4c84bff23e85c12e357523ac2bf5

  • SSDEEP

    12288:h0oLtwmG6PTVOxv4rHSopWpFhSaHo0sy42IlQJVnYr1JUupM:yg7G6PpmwryopWs0o0d42IlQJVn27Vp

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.58.115:55615

Targets

    • Target

      dfa785a11c98adec2ff4b2da28ad9f159bed1a031a8c8e1d82b662da9e4f1a3d

    • Size

      491KB

    • MD5

      061732e9348c37ac6220e4f6994d0a83

    • SHA1

      b59bbaa0721426a729d5cd6ffb1620543f53e03d

    • SHA256

      dfa785a11c98adec2ff4b2da28ad9f159bed1a031a8c8e1d82b662da9e4f1a3d

    • SHA512

      d89afa4e8f95dc23417509444ff20b3b228cac3e32d222572cd716e4fdd0e0f098e520b1c99288f357c2d6fe4f5dd046003c4c84bff23e85c12e357523ac2bf5

    • SSDEEP

      12288:h0oLtwmG6PTVOxv4rHSopWpFhSaHo0sy42IlQJVnYr1JUupM:yg7G6PpmwryopWs0o0d42IlQJVn27Vp

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks