General

  • Target

    5404B47556A2E1E9EB2F5DA481002616.exe

  • Size

    734KB

  • Sample

    240716-wh1cbswhlh

  • MD5

    5404b47556a2e1e9eb2f5da481002616

  • SHA1

    e3a45833fecb92ff8998fc6d4a13c9b80afe87db

  • SHA256

    9c6f132ef4142409bd7a1448d3dc52f774e9e33919031dac82f2afb27083945f

  • SHA512

    f3ff71f4a5637845e482e5d28656b2c7a502922ffdd599def1f243774820adc16c7de5a6804f2acff497568c93cdf180259628f2784da9dd16b9cc993e41edaf

  • SSDEEP

    12288:eYQyrJBxjjmHI8/fRRCtRazozhlzs+WxuEvhxYInrLQ3MqzNF7+wdIH8dZs3:eYlJBxjCHdRRSRNzfzs+0uE5xYwrLQ8b

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.57.67:55615

Targets

    • Target

      5404B47556A2E1E9EB2F5DA481002616.exe

    • Size

      734KB

    • MD5

      5404b47556a2e1e9eb2f5da481002616

    • SHA1

      e3a45833fecb92ff8998fc6d4a13c9b80afe87db

    • SHA256

      9c6f132ef4142409bd7a1448d3dc52f774e9e33919031dac82f2afb27083945f

    • SHA512

      f3ff71f4a5637845e482e5d28656b2c7a502922ffdd599def1f243774820adc16c7de5a6804f2acff497568c93cdf180259628f2784da9dd16b9cc993e41edaf

    • SSDEEP

      12288:eYQyrJBxjjmHI8/fRRCtRazozhlzs+WxuEvhxYInrLQ3MqzNF7+wdIH8dZs3:eYlJBxjCHdRRSRNzfzs+0uE5xYwrLQ8b

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks