General

  • Target

    108ed5c2d37d6359c1d8555704909549.exe

  • Size

    95KB

  • Sample

    240723-19myjasbkk

  • MD5

    108ed5c2d37d6359c1d8555704909549

  • SHA1

    9077f7c1102d4100290c07375664342e68c23062

  • SHA256

    e31e99244723c02b62ca36dffbafe607087955b69ea1b07b273ea1040072e2a3

  • SHA512

    37a64216ac27b728f2d6937acb58446f1405cb34d5a47c3a7dffac69a52853a2937e6873b9b117de24d66a1fa2a58d6677616332901f6d538dc748334fb17f39

  • SSDEEP

    1536:xqsIjlqzWlbG6jejoigIr43Ywzi0Zb78ivombfexv0ujXyyed2mteulgS6pk:f0UeYr+zi0ZbYe1g0ujyzdOk

Malware Config

Extracted

Family

redline

Botnet

Run

C2

89.105.219.86:39931

Targets

    • Target

      108ed5c2d37d6359c1d8555704909549.exe

    • Size

      95KB

    • MD5

      108ed5c2d37d6359c1d8555704909549

    • SHA1

      9077f7c1102d4100290c07375664342e68c23062

    • SHA256

      e31e99244723c02b62ca36dffbafe607087955b69ea1b07b273ea1040072e2a3

    • SHA512

      37a64216ac27b728f2d6937acb58446f1405cb34d5a47c3a7dffac69a52853a2937e6873b9b117de24d66a1fa2a58d6677616332901f6d538dc748334fb17f39

    • SSDEEP

      1536:xqsIjlqzWlbG6jejoigIr43Ywzi0Zb78ivombfexv0ujXyyed2mteulgS6pk:f0UeYr+zi0ZbYe1g0ujyzdOk

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks