General

  • Target

    ea9798cf7ee7fc6524a4cd372854b9f8d6659440d1ed8b414b317594325ac671.exe

  • Size

    105KB

  • Sample

    240626-b3zw3sxapf

  • MD5

    8cc6364a3e5091abe000b00e452bbbe4

  • SHA1

    92567b583b0d6a8c7eeff7972884d323cc17164c

  • SHA256

    ea9798cf7ee7fc6524a4cd372854b9f8d6659440d1ed8b414b317594325ac671

  • SHA512

    1f4571ae237a88ced9db341a160ae890658d34a85a29c9fb0e04ba17b6f3ec8fb62aeca5e6e03d311c3fa06a0e20b45deb2aa64a8b2cb4358b81d3a1cc88ab6b

  • SSDEEP

    1536:ynx6fVLEEwpgZFrEhOJfmJ4l6Ye0yHzw/dLbd39gCy8UyY9YJtPMj5nE1twTJJRQ:+6fVIErtRgYe0yH4Pg/hYQ2SJwAo

Malware Config

Extracted

Family

redline

Botnet

firstBuild

C2

91.92.241.139:56400

Targets

    • Target

      ea9798cf7ee7fc6524a4cd372854b9f8d6659440d1ed8b414b317594325ac671.exe

    • Size

      105KB

    • MD5

      8cc6364a3e5091abe000b00e452bbbe4

    • SHA1

      92567b583b0d6a8c7eeff7972884d323cc17164c

    • SHA256

      ea9798cf7ee7fc6524a4cd372854b9f8d6659440d1ed8b414b317594325ac671

    • SHA512

      1f4571ae237a88ced9db341a160ae890658d34a85a29c9fb0e04ba17b6f3ec8fb62aeca5e6e03d311c3fa06a0e20b45deb2aa64a8b2cb4358b81d3a1cc88ab6b

    • SSDEEP

      1536:ynx6fVLEEwpgZFrEhOJfmJ4l6Ye0yHzw/dLbd39gCy8UyY9YJtPMj5nE1twTJJRQ:+6fVIErtRgYe0yH4Pg/hYQ2SJwAo

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks