Resubmissions

29-07-2024 20:42

240729-zhay8atfmb 10

26-07-2024 11:22

240726-ng188sycjb 10

25-07-2024 05:05

240725-fqw2watble 10

General

  • Target

    a86d97fe008bfeb8568930bfa03e0057f77b0c8a46048ff011af244bfcefee59.zip

  • Size

    1.1MB

  • Sample

    240729-zhay8atfmb

  • MD5

    435ff08a82c3eacc14a1a46cf1553416

  • SHA1

    c049641ee17d4ab8b898ec112f9f99dbe77119a7

  • SHA256

    a86d97fe008bfeb8568930bfa03e0057f77b0c8a46048ff011af244bfcefee59

  • SHA512

    3e94d9ad3c3766eadc77b104a2db247b118b0ce04fc6b277a8f93150e89eb93c205329724a58c0a55117d699c3eb6277eca97d3d441f06b9fb142e23abdbccab

  • SSDEEP

    24576:w+Shb0Ug8XZdz5hrwoXo96VoroJju3wqHq4U3XbY6A3v3rII:Fcb0KVRwm86VorEjTqqF3Xcp

Malware Config

Extracted

Family

redline

Botnet

lovato

C2

57.128.132.216:55123

Targets

    • Target

      jli.dll

    • Size

      1.8MB

    • MD5

      072b9390df5cbe5015fe58da16923659

    • SHA1

      bea24458f5b981924f21c16cf8ac77566a821d65

    • SHA256

      fd2144a39e567bdf97b54014c6d912289bbd055835190fe377236c3ff8f89290

    • SHA512

      e84d607b0f1d039e371c7462f332193e6d0a41bcd3b50810ac162e5375b88d27f9d940d003ee2cfea11b5d66dfb33fc4b74fa50148749a96102b33bac90cca64

    • SSDEEP

      24576:3x9Cm6pOSgrbtR/UDI2KNc32ybHAaD835rkbqO1UkTrcwCPIdkgVmdwALoBhkw2:3x9Cm6ASgrbtFUDXTA7gMlPIxYRLgGr

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks