General

  • Target

    44b6f48a50be8b19b46773df9b712131.exe

  • Size

    95KB

  • Sample

    240309-l175saff5y

  • MD5

    44b6f48a50be8b19b46773df9b712131

  • SHA1

    e0a322b47ec2744abeda531092483f54c038faf9

  • SHA256

    38d43a3a1f0bda152fdd683184cbc79aee1ce6f422fe7ac3841a8b8a6cca1b3a

  • SHA512

    095f4a5010c003ac657c075232b920e07400291666237027c472369e766c4a2e72a36b11909f2b701fbb6de511cec00912c2fd5741d0e4d28c42b399874c2526

  • SSDEEP

    1536:9HqsIEq76ElbG6jejoigIY43Ywzi0Zb78ivombfexv0ujXyyed2jtmulgS6pM:91d+68YY+zi0ZbYe1g0ujyzdjM

Malware Config

Extracted

Family

redline

Botnet

@systemadminbd

C2

172.86.101.115:4483

Targets

    • Target

      44b6f48a50be8b19b46773df9b712131.exe

    • Size

      95KB

    • MD5

      44b6f48a50be8b19b46773df9b712131

    • SHA1

      e0a322b47ec2744abeda531092483f54c038faf9

    • SHA256

      38d43a3a1f0bda152fdd683184cbc79aee1ce6f422fe7ac3841a8b8a6cca1b3a

    • SHA512

      095f4a5010c003ac657c075232b920e07400291666237027c472369e766c4a2e72a36b11909f2b701fbb6de511cec00912c2fd5741d0e4d28c42b399874c2526

    • SSDEEP

      1536:9HqsIEq76ElbG6jejoigIY43Ywzi0Zb78ivombfexv0ujXyyed2jtmulgS6pM:91d+68YY+zi0ZbYe1g0ujyzdjM

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks