General

  • Target

    2585cb569fb0b17313e1181b721645f7b56114a527c94dac60e3fd15c7411370.exe

  • Size

    1.9MB

  • Sample

    240720-ky8g4avflp

  • MD5

    5a8bb97eda38a7db42e669fe8f34a067

  • SHA1

    732b563df5827ce251b5752d20e1454edaae3702

  • SHA256

    2585cb569fb0b17313e1181b721645f7b56114a527c94dac60e3fd15c7411370

  • SHA512

    c3fbc7e0a51733ccc087281aef884736b3d65c7c4eee241739a7bce8f97ae14f928fd3db27121b271187336ef24053b0239f0688e2440abcb595976fd791491e

  • SSDEEP

    49152:52u/BMdg532rpsjCMqigjns2+a95PlpiH9MzMrcgt4h6NdiBB:2rpEZITBB

Malware Config

Extracted

Family

redline

Botnet

lovato

C2

57.128.132.216:55123

Targets

    • Target

      2585cb569fb0b17313e1181b721645f7b56114a527c94dac60e3fd15c7411370.exe

    • Size

      1.9MB

    • MD5

      5a8bb97eda38a7db42e669fe8f34a067

    • SHA1

      732b563df5827ce251b5752d20e1454edaae3702

    • SHA256

      2585cb569fb0b17313e1181b721645f7b56114a527c94dac60e3fd15c7411370

    • SHA512

      c3fbc7e0a51733ccc087281aef884736b3d65c7c4eee241739a7bce8f97ae14f928fd3db27121b271187336ef24053b0239f0688e2440abcb595976fd791491e

    • SSDEEP

      49152:52u/BMdg532rpsjCMqigjns2+a95PlpiH9MzMrcgt4h6NdiBB:2rpEZITBB

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks