General

  • Target

    1308d7d9f135939b43490ded8b2853aa3019dd1488bf101319ffbad13735189c.exe

  • Size

    1.7MB

  • Sample

    240723-bmabgszbql

  • MD5

    759a72c6c8a741df207b79f1736e2b3c

  • SHA1

    5e587db482de9557530203b0b6f0eaf14805cab1

  • SHA256

    1308d7d9f135939b43490ded8b2853aa3019dd1488bf101319ffbad13735189c

  • SHA512

    bdc6e539da23c3bb37ef613a975215b26c3c6e90bea008d4b2c39eaccae0a7929702b27252ca408a0aa1f858682c04745edb789e22afc07a06349cb614a68152

  • SSDEEP

    12288:9Yi9sYhmoeoO7gSQu6elbNmD5vjD3FCPePWbU:9YmTcqSQuTSD5nFCWIU

Malware Config

Extracted

Family

redline

Botnet

lovato

C2

57.128.132.216:55123

Targets

    • Target

      1308d7d9f135939b43490ded8b2853aa3019dd1488bf101319ffbad13735189c.exe

    • Size

      1.7MB

    • MD5

      759a72c6c8a741df207b79f1736e2b3c

    • SHA1

      5e587db482de9557530203b0b6f0eaf14805cab1

    • SHA256

      1308d7d9f135939b43490ded8b2853aa3019dd1488bf101319ffbad13735189c

    • SHA512

      bdc6e539da23c3bb37ef613a975215b26c3c6e90bea008d4b2c39eaccae0a7929702b27252ca408a0aa1f858682c04745edb789e22afc07a06349cb614a68152

    • SSDEEP

      12288:9Yi9sYhmoeoO7gSQu6elbNmD5vjD3FCPePWbU:9YmTcqSQuTSD5nFCWIU

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks