General

  • Target

    07f970cff95e1ebcde588ad8808915376341e9f371f9c05a9873f942988b4ac8.exe

  • Size

    1.8MB

  • Sample

    240725-sg82asyela

  • MD5

    d7e66880341b1a0e1bd53696b64e4833

  • SHA1

    1609e5620c3a8151adc69ba3b058538597d77aa6

  • SHA256

    07f970cff95e1ebcde588ad8808915376341e9f371f9c05a9873f942988b4ac8

  • SHA512

    67b34ef9fa7a1ade39b56250dba47853f4a900294dca053ade07f4f59168c520d127ca8809eb2356767444d323424da449493f57946f84ae1d1c9bdb1c20e64f

  • SSDEEP

    49152:nTvC/MTQYxsWR7aqXHHJpGPn8z+uPQVpSfyYEpq:TjTQYxsWRRnTGP86pA9Ep

Malware Config

Targets

    • Target

      07f970cff95e1ebcde588ad8808915376341e9f371f9c05a9873f942988b4ac8.exe

    • Size

      1.8MB

    • MD5

      d7e66880341b1a0e1bd53696b64e4833

    • SHA1

      1609e5620c3a8151adc69ba3b058538597d77aa6

    • SHA256

      07f970cff95e1ebcde588ad8808915376341e9f371f9c05a9873f942988b4ac8

    • SHA512

      67b34ef9fa7a1ade39b56250dba47853f4a900294dca053ade07f4f59168c520d127ca8809eb2356767444d323424da449493f57946f84ae1d1c9bdb1c20e64f

    • SSDEEP

      49152:nTvC/MTQYxsWR7aqXHHJpGPn8z+uPQVpSfyYEpq:TjTQYxsWRRnTGP86pA9Ep

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • UAC bypass

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks