General

  • Target

    Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.doc

  • Size

    16KB

  • Sample

    240624-tctaqatekl

  • MD5

    9edc82805ecc2d30f07d99973883c3c6

  • SHA1

    877fae637a454593a1b66bfede20356803833266

  • SHA256

    927e8668d7e5b22d0d278cb66ecbb15a51420f2fc5299aaa324d43a7d04719a2

  • SHA512

    b24ed91e3f53fe2cfc0b0fdaebcd495cbc878507187a802ed019736be707d5d832f149360dba0cfd394df5e0406bd979fda5aff4357fe4e2bede514098fc8cf3

  • SSDEEP

    384:tyXxo8qWds8PL8wi4OEwH8TIbE91r2fR3JYovij7XCnp:tcxIq5P3DOqnYJZ1vO7XCp

Malware Config

Extracted

Family

redline

Botnet

wordfile

C2

185.38.142.10:7474

Targets

    • Target

      Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.doc

    • Size

      16KB

    • MD5

      9edc82805ecc2d30f07d99973883c3c6

    • SHA1

      877fae637a454593a1b66bfede20356803833266

    • SHA256

      927e8668d7e5b22d0d278cb66ecbb15a51420f2fc5299aaa324d43a7d04719a2

    • SHA512

      b24ed91e3f53fe2cfc0b0fdaebcd495cbc878507187a802ed019736be707d5d832f149360dba0cfd394df5e0406bd979fda5aff4357fe4e2bede514098fc8cf3

    • SSDEEP

      384:tyXxo8qWds8PL8wi4OEwH8TIbE91r2fR3JYovij7XCnp:tcxIq5P3DOqnYJZ1vO7XCp

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Abuses OpenXML format to download file from external location

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks