General

  • Target

    b77fc538e119d7b94ac123c2fe21b5d403316cbc4510479130f195a18dc61f32.exe

  • Size

    797KB

  • Sample

    240708-bses6ayajh

  • MD5

    114f1c23daae885f851b9cf1fdaf8457

  • SHA1

    82338420d02452dfbd4bed8ed753e50739f27484

  • SHA256

    b77fc538e119d7b94ac123c2fe21b5d403316cbc4510479130f195a18dc61f32

  • SHA512

    262650ad16731df09db9f6f5c816d45e6e2b9bf72a3d8af30ec121d3a1f0fc6e402da3117ecee472af777c7a6e1ac8fa5cd5e7c4ab7517fc7d2d61a9d9659ddb

  • SSDEEP

    24576:jqxzXQRlUnZRJOU3MlrQvB5LcFFVo7S+vRSBJIZJi:jq91ZR0U3MlMvHcFFVo7EBAJi

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.137.22.78:55615

Targets

    • Target

      b77fc538e119d7b94ac123c2fe21b5d403316cbc4510479130f195a18dc61f32.exe

    • Size

      797KB

    • MD5

      114f1c23daae885f851b9cf1fdaf8457

    • SHA1

      82338420d02452dfbd4bed8ed753e50739f27484

    • SHA256

      b77fc538e119d7b94ac123c2fe21b5d403316cbc4510479130f195a18dc61f32

    • SHA512

      262650ad16731df09db9f6f5c816d45e6e2b9bf72a3d8af30ec121d3a1f0fc6e402da3117ecee472af777c7a6e1ac8fa5cd5e7c4ab7517fc7d2d61a9d9659ddb

    • SSDEEP

      24576:jqxzXQRlUnZRJOU3MlrQvB5LcFFVo7S+vRSBJIZJi:jq91ZR0U3MlMvHcFFVo7EBAJi

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks