Resubmissions

29-07-2024 20:42

240729-zhay8atfmb 10

26-07-2024 11:22

240726-ng188sycjb 10

25-07-2024 05:05

240725-fqw2watble 10

General

  • Target

    a86d97fe008bfeb8568930bfa03e0057f77b0c8a46048ff011af244bfcefee59.zip

  • Size

    1.1MB

  • Sample

    240726-ng188sycjb

  • MD5

    435ff08a82c3eacc14a1a46cf1553416

  • SHA1

    c049641ee17d4ab8b898ec112f9f99dbe77119a7

  • SHA256

    a86d97fe008bfeb8568930bfa03e0057f77b0c8a46048ff011af244bfcefee59

  • SHA512

    3e94d9ad3c3766eadc77b104a2db247b118b0ce04fc6b277a8f93150e89eb93c205329724a58c0a55117d699c3eb6277eca97d3d441f06b9fb142e23abdbccab

  • SSDEEP

    24576:w+Shb0Ug8XZdz5hrwoXo96VoroJju3wqHq4U3XbY6A3v3rII:Fcb0KVRwm86VorEjTqqF3Xcp

Malware Config

Extracted

Family

redline

Botnet

lovato

C2

57.128.132.216:55123

Targets

    • Target

      RFQ-SW M-0013091-DHABI HARDWARE.exe

    • Size

      24KB

    • MD5

      9f6938e89824ccce04a9272087dec776

    • SHA1

      7f19bee228698f4b0bb90b40c6ca2bcadc326a66

    • SHA256

      b500874cd5939223c2b7cb52134bef3a3bf6ab1c1d112bf27c6b5e5b15f8177f

    • SHA512

      e0052a1bcf5d5ab910da6541c51338e1215a265e8521260bf08ab00ac0320653dafab565ef616d7f1192fb55d4b0feb1666b1a73fcc7b08ae0ac0e625f4b67e1

    • SSDEEP

      384:eM4cghl1oqCrKFf4H5A2eFP27xWkVbgWUlIx4cNWcG0FP27NBY3Yuv+ivM:WSqbFQH5iKxnVbgvqxNNZK/Y/+

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks