General

  • Target

    6d62a0958a7574ba2ad7dce6199bbd1520afd23fea2183dc031b234e5fc66698.exe

  • Size

    95KB

  • Sample

    240629-br9xxa1arr

  • MD5

    6bd0efca19c8a21373008dd422aaf39b

  • SHA1

    c81af8840eccf6a7b5354046ace6e1a4a77b487f

  • SHA256

    6d62a0958a7574ba2ad7dce6199bbd1520afd23fea2183dc031b234e5fc66698

  • SHA512

    6ffd237cd396f420bd4d7c7fe2fd74bc23b47c410f576c8c1cb57bd70a4285bece186318f7fa4b787eb077cf16c1b1d8cf4453a7d8977232d28160d82187857c

  • SSDEEP

    1536:5qs+OqJGlbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2GteulgS6p8l:XRuOYj+zi0ZbYe1g0ujyzd+8

Malware Config

Extracted

Family

redline

Botnet

wordfile

C2

185.38.142.10:7474

Targets

    • Target

      6d62a0958a7574ba2ad7dce6199bbd1520afd23fea2183dc031b234e5fc66698.exe

    • Size

      95KB

    • MD5

      6bd0efca19c8a21373008dd422aaf39b

    • SHA1

      c81af8840eccf6a7b5354046ace6e1a4a77b487f

    • SHA256

      6d62a0958a7574ba2ad7dce6199bbd1520afd23fea2183dc031b234e5fc66698

    • SHA512

      6ffd237cd396f420bd4d7c7fe2fd74bc23b47c410f576c8c1cb57bd70a4285bece186318f7fa4b787eb077cf16c1b1d8cf4453a7d8977232d28160d82187857c

    • SSDEEP

      1536:5qs+OqJGlbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2GteulgS6p8l:XRuOYj+zi0ZbYe1g0ujyzd+8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks