General

  • Target

    f7b1909a121a8ae8df6f3c54043a14a3726fb0cbdcfdab1f273b26458b318910.exe

  • Size

    95KB

  • Sample

    240520-bnyepsch88

  • MD5

    a2c08a55b2b269965a786a352398596d

  • SHA1

    1a12cd9455c3cb7b0b9b49c35f7c2deb1e1c316a

  • SHA256

    f7b1909a121a8ae8df6f3c54043a14a3726fb0cbdcfdab1f273b26458b318910

  • SHA512

    704f9d67ea229f4d1dbeff83110c2237f3c847c3dbe3e40caff180a8bccee083eeebecd0b806c65db7a0ad1bd776b080578abc68eda4ae6b94c391eabf7012e1

  • SSDEEP

    1536:Jqskqq+zlbG6jejoigIT43Ywzi0Zb78ivombfexv0ujXyyed2jteulgS6pt:nPpZYT+zi0ZbYe1g0ujyzdft

Malware Config

Extracted

Family

redline

Botnet

3

C2

94.156.8.28:65012

Targets

    • Target

      f7b1909a121a8ae8df6f3c54043a14a3726fb0cbdcfdab1f273b26458b318910.exe

    • Size

      95KB

    • MD5

      a2c08a55b2b269965a786a352398596d

    • SHA1

      1a12cd9455c3cb7b0b9b49c35f7c2deb1e1c316a

    • SHA256

      f7b1909a121a8ae8df6f3c54043a14a3726fb0cbdcfdab1f273b26458b318910

    • SHA512

      704f9d67ea229f4d1dbeff83110c2237f3c847c3dbe3e40caff180a8bccee083eeebecd0b806c65db7a0ad1bd776b080578abc68eda4ae6b94c391eabf7012e1

    • SSDEEP

      1536:Jqskqq+zlbG6jejoigIT43Ywzi0Zb78ivombfexv0ujXyyed2jteulgS6pt:nPpZYT+zi0ZbYe1g0ujyzdft

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.

MITRE ATT&CK Enterprise v15

Tasks