General

  • Target

    3846584ad0540002da41ee6988d4204f8d78d303915b9d637547a114be9723f0

  • Size

    536KB

  • Sample

    240309-gqh1paeb7t

  • MD5

    008041a4d74e16286c6a0a5ed1bb87f2

  • SHA1

    ad5dcb8d2e57ab25815d559998052a857b0dcea8

  • SHA256

    3846584ad0540002da41ee6988d4204f8d78d303915b9d637547a114be9723f0

  • SHA512

    d1ea771f7be0b85d638c0782ebfbc4a5cb0a31d8da8fd54952877f3dee7257d1f41c965442974bd5608970c9d1ca4fe3385c9964688dc8e11628b451fda1db80

  • SSDEEP

    12288:VE6jD/OpESQkca3hI9NTCFS28KNgCdgspRENz:VtD/ZSn+NPKNvOkREN

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.58.239:55615

Targets

    • Target

      3846584ad0540002da41ee6988d4204f8d78d303915b9d637547a114be9723f0

    • Size

      536KB

    • MD5

      008041a4d74e16286c6a0a5ed1bb87f2

    • SHA1

      ad5dcb8d2e57ab25815d559998052a857b0dcea8

    • SHA256

      3846584ad0540002da41ee6988d4204f8d78d303915b9d637547a114be9723f0

    • SHA512

      d1ea771f7be0b85d638c0782ebfbc4a5cb0a31d8da8fd54952877f3dee7257d1f41c965442974bd5608970c9d1ca4fe3385c9964688dc8e11628b451fda1db80

    • SSDEEP

      12288:VE6jD/OpESQkca3hI9NTCFS28KNgCdgspRENz:VtD/ZSn+NPKNvOkREN

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks