General

  • Target

    71bfda60ac622c2c4c11a6b317ad9167306770433b33678b4a0a7fcf03a479e9.exe

  • Size

    460KB

  • Sample

    240729-bnfvnavhpk

  • MD5

    0dc5a31dc31519a64590721ee59fba4a

  • SHA1

    52a344dc56222a3058ed067f46efc7996a47226d

  • SHA256

    71bfda60ac622c2c4c11a6b317ad9167306770433b33678b4a0a7fcf03a479e9

  • SHA512

    21533aa3415c711afb59a809ef4669fe9a68b8ecc5529bdbb0f8bd2ac23a8d98aff3a9175ccab5d874b9443af472c396a1c1d8d92038f87830c70431cdd3748a

  • SSDEEP

    12288:VpxiviXZ2egclzBK6BJZpWskPhIMjluC61XAnc:vxlXZ2egcbK6BlWlhxaH

Malware Config

Extracted

Family

redline

Botnet

success-logs

C2

147.182.130.25:16383

Targets

    • Target

      71bfda60ac622c2c4c11a6b317ad9167306770433b33678b4a0a7fcf03a479e9.exe

    • Size

      460KB

    • MD5

      0dc5a31dc31519a64590721ee59fba4a

    • SHA1

      52a344dc56222a3058ed067f46efc7996a47226d

    • SHA256

      71bfda60ac622c2c4c11a6b317ad9167306770433b33678b4a0a7fcf03a479e9

    • SHA512

      21533aa3415c711afb59a809ef4669fe9a68b8ecc5529bdbb0f8bd2ac23a8d98aff3a9175ccab5d874b9443af472c396a1c1d8d92038f87830c70431cdd3748a

    • SSDEEP

      12288:VpxiviXZ2egclzBK6BJZpWskPhIMjluC61XAnc:vxlXZ2egcbK6BlWlhxaH

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks