General

  • Target

    0d4feafddbc8cd435c3a9c5c388b1ffa02645fccb3d8b90184879c9e47a5708b

  • Size

    803KB

  • Sample

    240309-eyb61acf53

  • MD5

    0941a476f921a5fe2d0c42ed2e6dc73a

  • SHA1

    f8121c97173bf1419f1fb9ff1a936da8810a0986

  • SHA256

    0d4feafddbc8cd435c3a9c5c388b1ffa02645fccb3d8b90184879c9e47a5708b

  • SHA512

    97052941727374a357d1db7b529a51691b05269dedf02f6d0b0f5f99e094dd4fd21469441a44916cf35f2098fa95b17b48efc222595a8e61bdf8a90757ea2bdd

  • SSDEEP

    12288:rGXDY6tajoclU7lnoKJPaRPAzT4oJScpJG5yPigImVpj:CzYiKKQRPoT4jcpJ9agIs

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.57.69:55615

Targets

    • Target

      0d4feafddbc8cd435c3a9c5c388b1ffa02645fccb3d8b90184879c9e47a5708b

    • Size

      803KB

    • MD5

      0941a476f921a5fe2d0c42ed2e6dc73a

    • SHA1

      f8121c97173bf1419f1fb9ff1a936da8810a0986

    • SHA256

      0d4feafddbc8cd435c3a9c5c388b1ffa02645fccb3d8b90184879c9e47a5708b

    • SHA512

      97052941727374a357d1db7b529a51691b05269dedf02f6d0b0f5f99e094dd4fd21469441a44916cf35f2098fa95b17b48efc222595a8e61bdf8a90757ea2bdd

    • SSDEEP

      12288:rGXDY6tajoclU7lnoKJPaRPAzT4oJScpJG5yPigImVpj:CzYiKKQRPoT4jcpJ9agIs

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks