General

  • Target

    c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe

  • Size

    1.9MB

  • Sample

    240716-yerxwsxamp

  • MD5

    03c597ac6fae7130833e04e289c1a707

  • SHA1

    d0b60497f4b5143b81947c630654fb4cce438f4b

  • SHA256

    c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0

  • SHA512

    6e962c318afc6c4b48b964dd6af4e64cea6d0f2f7f44b2d90ef573f8b5070261c00f3c27821512bf0fc55b98438abeb3ed30b8c7e2f072c8dc90eaf8a49ab928

  • SSDEEP

    12288:6eRkAGag6meBQRgsPNFN8+uBdjyAPDHVtrM82QYm:6GPsTNydWgDVtrj

Malware Config

Extracted

Family

redline

Botnet

unk777

C2

159.203.177.31:16383

Targets

    • Target

      c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe

    • Size

      1.9MB

    • MD5

      03c597ac6fae7130833e04e289c1a707

    • SHA1

      d0b60497f4b5143b81947c630654fb4cce438f4b

    • SHA256

      c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0

    • SHA512

      6e962c318afc6c4b48b964dd6af4e64cea6d0f2f7f44b2d90ef573f8b5070261c00f3c27821512bf0fc55b98438abeb3ed30b8c7e2f072c8dc90eaf8a49ab928

    • SSDEEP

      12288:6eRkAGag6meBQRgsPNFN8+uBdjyAPDHVtrM82QYm:6GPsTNydWgDVtrj

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks