General

  • Target

    build.exe

  • Size

    95KB

  • Sample

    240421-smdscadh94

  • MD5

    5bf06998216b64bdde7e0356fff186e6

  • SHA1

    2bfc86b0718eff41d4976212547fc651c75a5814

  • SHA256

    b5f4a205a5c19245cfc9ea9a0e443d394b76f94af19f69144a084a5252c0da50

  • SHA512

    1355ec92bf7eedba5b3785fb2ecc83aa91fb4beebdecca863c40f1e64925af9ee6281b78137ec891a278da808dbe4f3eca0828d6aece17f25cf061ab108e741c

  • SSDEEP

    1536:VqsQLq+8lbG6jejoigI843Ywzi0Zb78ivombfexv0ujXyyed213teulgS6pA:TuZkY8+zi0ZbYe1g0ujyzd1A

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

month-washer.gl.at.ply.gg:33498

Targets

    • Target

      build.exe

    • Size

      95KB

    • MD5

      5bf06998216b64bdde7e0356fff186e6

    • SHA1

      2bfc86b0718eff41d4976212547fc651c75a5814

    • SHA256

      b5f4a205a5c19245cfc9ea9a0e443d394b76f94af19f69144a084a5252c0da50

    • SHA512

      1355ec92bf7eedba5b3785fb2ecc83aa91fb4beebdecca863c40f1e64925af9ee6281b78137ec891a278da808dbe4f3eca0828d6aece17f25cf061ab108e741c

    • SSDEEP

      1536:VqsQLq+8lbG6jejoigI843Ywzi0Zb78ivombfexv0ujXyyed213teulgS6pA:TuZkY8+zi0ZbYe1g0ujyzd1A

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks