General

  • Target

    1158215d5b921e90114b5dd8f7bc2abc927444ee824c608e10f7633932bc1afc.exe

  • Size

    757KB

  • Sample

    240528-rs73psgh9w

  • MD5

    3dfee0f08718b5a1f62cd19d3137b122

  • SHA1

    4603546fc6718b8825c86056f7980240bb914a77

  • SHA256

    1158215d5b921e90114b5dd8f7bc2abc927444ee824c608e10f7633932bc1afc

  • SHA512

    a27f1637d6182560fad0057a629a319a5947735230c3a588b9de13647acf8de7056a87c8fae9ed86a65310b434ce94277c882b02aaf2a9bec464a40be8ecd4e8

  • SSDEEP

    12288:a8Tbkm3DwMw3At2l1TqXt0oeyhQPMZrv9bwykR:a8Mn3c2TTtyGO9UB

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.137.22.173:55615

Targets

    • Target

      1158215d5b921e90114b5dd8f7bc2abc927444ee824c608e10f7633932bc1afc.exe

    • Size

      757KB

    • MD5

      3dfee0f08718b5a1f62cd19d3137b122

    • SHA1

      4603546fc6718b8825c86056f7980240bb914a77

    • SHA256

      1158215d5b921e90114b5dd8f7bc2abc927444ee824c608e10f7633932bc1afc

    • SHA512

      a27f1637d6182560fad0057a629a319a5947735230c3a588b9de13647acf8de7056a87c8fae9ed86a65310b434ce94277c882b02aaf2a9bec464a40be8ecd4e8

    • SSDEEP

      12288:a8Tbkm3DwMw3At2l1TqXt0oeyhQPMZrv9bwykR:a8Mn3c2TTtyGO9UB

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks