General

  • Target

    E87AD5F7041EFF087B6BFF15CF1DAB3A.exe

  • Size

    657KB

  • Sample

    240717-gqwlsaybqm

  • MD5

    e87ad5f7041eff087b6bff15cf1dab3a

  • SHA1

    9a22fb7c1769a517b4b72e4310ff7c9f399f0f32

  • SHA256

    a03e5ea28a045edffc05c69ec5d06601425b60ec2523448bd46e14ff17643c95

  • SHA512

    b6477f6e27aefd2851b5827ef202e7b918e5085afaa21ad9fdbde3d3aeae87cd4e1020ce207e1b276ed472c77f30063abde39f24e71c657bbfe9bf6191b5a815

  • SSDEEP

    12288:J7PcxgeYL893+uJ6C+Qs8ffuc2BgFEM0XZJEmJ2rIO:JbcYgBqSfuc2Bgn0smJUN

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.57.147:55615

Targets

    • Target

      E87AD5F7041EFF087B6BFF15CF1DAB3A.exe

    • Size

      657KB

    • MD5

      e87ad5f7041eff087b6bff15cf1dab3a

    • SHA1

      9a22fb7c1769a517b4b72e4310ff7c9f399f0f32

    • SHA256

      a03e5ea28a045edffc05c69ec5d06601425b60ec2523448bd46e14ff17643c95

    • SHA512

      b6477f6e27aefd2851b5827ef202e7b918e5085afaa21ad9fdbde3d3aeae87cd4e1020ce207e1b276ed472c77f30063abde39f24e71c657bbfe9bf6191b5a815

    • SSDEEP

      12288:J7PcxgeYL893+uJ6C+Qs8ffuc2BgFEM0XZJEmJ2rIO:JbcYgBqSfuc2Bgn0smJUN

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks