General

  • Target

    4c729bce0fed845f963ff70d77bc3a57affd2afab9c556244f044695bd4875ed

  • Size

    1.3MB

  • Sample

    240516-gy5vesfd5s

  • MD5

    2fb988b4bd7a8e7dfd06a0ceada21535

  • SHA1

    6e54d782fbaaed5970835b63c55b8366059d8ba0

  • SHA256

    4c729bce0fed845f963ff70d77bc3a57affd2afab9c556244f044695bd4875ed

  • SHA512

    a0b0970a250c18ba765bba8d75ff96b342f0fd2875e1e9dc0d45aa4d3cacafea08d6ce876ed31c5180880a7216c5385b4933b31225d27384bf740f5e6e4343d6

  • SSDEEP

    24576:3cIsQl3JjBBrEKSP2vHhn2G/u4yudTfkkUUKKEsKucf:M+l3JjDzSP8Hv/BrdTskgsFcf

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

91.92.249.99:13359

Targets

    • Target

      e1dbb4d7308b83fa578a49acb3f8d23b643824ba5626ee3c4b7abd7b6c4f7ac5.exe

    • Size

      3.4MB

    • MD5

      db427cc5464c265577871c31bc1065d0

    • SHA1

      796cf29ee18ef8997b901295326f18dbe0d0a7dd

    • SHA256

      e1dbb4d7308b83fa578a49acb3f8d23b643824ba5626ee3c4b7abd7b6c4f7ac5

    • SHA512

      5002167b41cd4460417d72a283aded7d0c7c9fc171cc6996abd5fbcd02f0fbb217164e189a042631d4abf5f76d84b7b24b94008d8027b5a86b2f19523c1bc993

    • SSDEEP

      24576:TVsQ6BKfC+CWDU2fy6Uuri8MmOmbCYUz7PH8Zeaj0HM3ow5XtyB:TVeBB2kMOnYUvPb

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks